SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses protocol number 50.
Difffie-Hellman
SHA
ESP
AH
2. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
RSA
3DES
Difffie-Hellman
IPSEC (phase2)
3. 'provides everything required to securely connect over a public media - such as the Internet.'
3DES
IPSEC
hash algorithms
MD5
4. The sending device encrypts for a final time with another 56-bit key.
hash-based message authentication codes (HMAC).
RSA
3DES
Difffie-Hellman
5. Used in government installs and was created to work with the SHA-1 hash algorithm.
DSA
Hashing
ESP
IKE
6. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
Tunneling
DES
SHA
AES
7. 'Digital signatures. Peer X encrypts a hash value with his private key and then sends the data to Peer Y. Peer Y obtains Peer X
Difffie-Hellman
RSA
ESP
AES
8. Uses IKE for key exchange.
IPSEC
3DES
GRE
ISAKMP
9. More CPU intensive
Difffie-Hellman
DES
IPSEC (main mode)
SHA
10. 'The sending device decrypts the data with the second key - which is also 56 bits in length.'
Difffie-Hellman
3DES
AH
AH/ESP
11. That authenticate data packets and ensure that data is not tampered with or modified.
hash algorithms
Tunnel Mode (ipsec)
AH
MD5
12. Act of encapsulating a packet within another packet.
IPSEC (main mode)
RSA
Tunneling
'IPSEC (phase1 -step3)'
13. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
RSA
DSA
IKE
3DES
14. Uses protocol number 51.
AH
3DES
Hashing
IPSEC (main mode)
15. Verify whether the data has been altered.
IKE
MD5
Hashing
RSA
16. 'The messages are authenticated - and the mechanisms that provide such integrity checks based on a secret key are usually called'
IKE
Asymetric Encryption Protocols
IPSEC (main mode)
message authentication codes (MAC).
17. Does not provide payload encryption.
AH
Asymetric Encryption Protocols
IPSEC BENEFIT
IPSEC (aggressive mode)
18. The DES algorithm that performs 3 times sequentially.
3DES
IPSEC (main mode)
IKE
RSA
19. RFC 2631 on the workings of the key generation/exchange process.
AH/ESP
Difffie-Hellman
Asymetric Encryption Protocols
hash-based message authentication codes (HMAC).
20. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
Asymetric Encryption Protocols
AH/ESP
ISAKMP
Difffie-Hellman
21. Uses the D-H algorithm to come to agreement over a public network.
Tunneling
IKE
Tunnel Mode (ipsec)
IPSEC (aggressive mode)
22. IPsec implements using a shim header between L2 and L3
AH/ESP
RSA
AES
ESP
23. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
AH
AH
IKE
IPSEC BENEFIT
24. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
IPSEC (aggressive mode)
Difffie-Hellman
Hashing
3DES
25. The receiving device then encrypts the data with the second key.
AH
AH/ESP
3DES
'MD5 - SHA-1 - or RSA'
26. 'key exchange is vulnerable to a man-in-the-middle attack. You can rectify this problem by allowing the two parties to authenticate themselves to each other with a shared secret key - digital signatures - or public-key certificates.'
IPSEC
IPSEC (aggressive mode)
Difffie-Hellman
SHA
27. 'requires that the sender and receiver have key pairs. By combining the sender
IPSEC (aggressive mode)
'MD5 - SHA-1 - or RSA'
IKE
Difffie-Hellman
28. IPSEC tunnels data through IP using one of two protocols?
AH/ESP
RSA
Hashing
hash-based message authentication codes (HMAC).
29. A
Difffie-Hellman
IKE
Hashing
AH
30. Main mode establishes ISAKMP security association in six messages and performs authenticated D-H exchange.
'MD5 - SHA-1 - or RSA'
ESP
Difffie-Hellman
IPSEC (main mode)
31. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. 'is a block-cipher algorithm - which means that it performs operations on fixed-length data streams of 64-bit blocks. The key ostensibly consists of 64 bits; however - only 56 are actually used by the algorithm.'
3DES
DES
3DES
IPSEC (main mode)
33. DoS attacks are more probable with this mode.
IKE
ESP
IPSEC (aggressive mode)
DES
34. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Can be implemented efficiently on a wide range of processors and in hardware.
IPSEC (main mode)
AES
IKE
DES
36. A variable block- length and key-length cipher.
AES
IPSEC (main mode)
IPSEC BENEFIT
AH
37. 'is a more secure version of MD5 - and hash-based message authentication codes (HMAC) provides further security with the inclusion of a key-based hash.'
SHA
AH
AH/ESP
HMAC
38. Provides authentication and encryption of the payload.
GRE
ESP
IPSEC
RSA
39. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
MD5
AES
IPSEC (main mode)
'MD5 - SHA-1 - or RSA'
41. Used in IPsec for two discreet purposes:
DSA
Hashing
RSA
3DES
42. It uses UDP 500 and is defined by RFC 2409.
Hashing
3DES
IKE
SHA
43. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
AES
ESP
DSA
message authentication codes (MAC).
44. Where the original Layer 3 header and payload inside an IPsec packet is encapsulated. Tunnel mode does add overhead to each packet and uses some additional CPU resources.
MD5
'IPSEC (phase1 -step3)'
Tunnel Mode (ipsec)
Hashing
45. 'MACs with hash algorithms -'
hash-based message authentication codes (HMAC).
ISAKMP
GRE
SHA
46. This mode does not support identity protection or protection against clogging attacks and spoofing.
IPSEC (aggressive mode)
IPSEC (main mode)
Asymetric Encryption Protocols
3DES
47. Invented by Ron Rivest of RSA Security (RFC 1321).
HMAC
AH/ESP
MD5
SHA
48. IPSec SAs are negotiated and protected by the existing IPsec SA.
Difffie-Hellman
IKE
IKE
IPSEC (phase2)
49. Data integrity is the process of making sure data is not tampered with while it
IPSEC BENEFIT
IPSEC (main mode)
Hashing
SHA
50. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183