SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPSEC tunnels data through IP using one of two protocols?
IPSEC (aggressive mode)
DSA
AH/ESP
ISAKMP
2. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
Difffie-Hellman
ISAKMP
IPSEC (aggressive mode)
ESP
3. Can be implemented efficiently on a wide range of processors and in hardware.
RSA
Difffie-Hellman
AES
ESP
4. Main disadvantage of asymmetric algorithms is that they are slow.
SHA
'MD5 - SHA-1 - or RSA'
Tunnel Mode (ipsec)
RSA/DSA
5. That authenticate data packets and ensure that data is not tampered with or modified.
IPSEC BENEFIT
IPSEC (aggressive mode)
ISAKMP
hash algorithms
6. 'including Internet Security Association and Key Management Protocol (ISAKMP) - Secure Key Exchange Mechanism for the Internet (SKEME) - and Oakley.'
Asymetric Encryption Protocols
IKE
AH
'IPSEC (phase1 -step3)'
7. Uses protocol number 50.
DES
Hashing
ESP
SHA
8. 'group 1 identifies a 768-bit key - group 1 is faster to execute - but it is less secure -'
hash-based message authentication codes (HMAC).
DES
ISAKMP
Difffie-Hellman
9. RFC 2631 on the workings of the key generation/exchange process.
'MD5 - SHA-1 - or RSA'
Difffie-Hellman
RSA/DSA
3DES
10. Has a trailer which identifies IPsec information and ESP integrity-check information.
3DES
MD5
MD5
ESP
11. 'is a more secure version of MD5 - and hash-based message authentication codes (HMAC) provides further security with the inclusion of a key-based hash.'
AH
ISAKMP
SHA
IKE
12. Invented by Ron Rivest of RSA Security (RFC 1321).
AH
Hashing
MD5
AH
13. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. 'Created by NIST in 1994 - is the algorithm used for digital signatures but not for encryption.'
IPSEC (main mode)
DSA
ISAKMP
Origin Auth (DH auth)
15. Used in government installs and was created to work with the SHA-1 hash algorithm.
3DES
DSA
SHA
3DES
16. A
Hashing
AH
'DES - 3DES - or AES.'
IPSEC (aggressive mode)
17. Key exchange for IPSEC
IKE
IPSEC (main mode)
Difffie-Hellman
Origin Auth (DH auth)
18. 'When using the hash-based key function -'
HMAC
IKE
HMAC-MD5/HMAC-SHA
RSA
19. 'Message digest algorithms have a drawback whereby a hacker (man in the middle) can intercept a message containing the packet and hash values - then re-create and transmit a modified packet with the same calculated hash to the target destination.'
IPSEC (aggressive mode)
Difffie-Hellman
Hashing
SHA
20. Common key size is 1024 bits.
MD5
DES
SHA
RSA
21. 'has a Next Protocol field which identifies the next Layer 4 transport protocol in use - TCP or UDP'
AH
IPSEC (aggressive mode)
AH/ESP
MD5
22. 'Encryption - where Peer X uses Peer Y
Difffie-Hellman
RSA
Difffie-Hellman
IPSEC (aggressive mode)
23. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
Tunnel Mode (ipsec)
AH
SHA
AES
24. The protocol of choice for key management and establishing security associations between peers on the Internet.
IPSEC (phase2)
DSA
ISAKMP
AH
25. One of the most popular tunneling protocols is
SHA
Asymetric Encryption Protocols
GRE
IPSEC BENEFIT
26. Origin authentication validates the origin of a message upon receipt; this process is done during initial communications.
DES
IPSEC BENEFIT
Difffie-Hellman
AES
27. IPSEC performs this function by using a sequence field in the IPsec header combined with integrity checks.
Difffie-Hellman
RSA/DSA
AES
Antireplay
28. Does not provide payload encryption.
hash-based message authentication codes (HMAC).
Difffie-Hellman
SHA
AH
29. DoS attacks are more probable with this mode.
IPSEC (main mode)
3DES
RSA
IPSEC (aggressive mode)
30. Uses protocol number 51.
IPSEC (aggressive mode)
AH
Asymetric Encryption Protocols
RSA
31. This mode does not support identity protection or protection against clogging attacks and spoofing.
IKE
IPSEC (aggressive mode)
Antireplay
RSA
32. Uses IKE for key exchange.
AES
ISAKMP
Hashing
DES
33. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. The sending device encrypts for a final time with another 56-bit key.
ISAKMP
IPSEC (main mode)
3DES
IPSEC (aggressive mode)
35. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
ESP
IPSEC (phase2)
MD5
Difffie-Hellman
36. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
AES
IPSEC (aggressive mode)
IPSEC (main mode)
3DES
37. Is a two-phase protocol: The first phase establishes a secure authenticated channel and the second phase is where SAs are negotiated on behalf of the IPsec services.
DES
ISAKMP
hash algorithms
IKE
38. 'DSA is roughly the same speed as RSA when creating signatures - but 10 to 40 times slower when verifying signatures. Because verification happens more frequently than creation - this issue is worth noting when deploying DSA in any environment.'
Hashing
AH
DSA
Hashing
39. ' is defined in RFC 3174. has as output a 160-bit value -'
SHA
IPSEC BENEFIT
DSA
MD5
40. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
Hashing
'MD5 - SHA-1 - or RSA'
SHA
ISAKMP
41. No additional Layer 3 header is created. The original Layer 3 header is used.
SHA
IPSEC (phase2)
Transport Mode (Ipsec)
Asymetric Encryption Protocols
42. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. The receiving device then encrypts the data with the second key.
ESP
AH/ESP
3DES
'IPSEC (phase1 -step3)'
44. Used for integrity checks on peer and data sent by peer and for authentication checks.
AH
SHA
IKE
hash algorithms
45. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
ISAKMP
MD5
IPSEC (aggressive mode)
ESP
46. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
AH
Difffie-Hellman
Hashing
3DES
47. 'key exchange is vulnerable to a man-in-the-middle attack. You can rectify this problem by allowing the two parties to authenticate themselves to each other with a shared secret key - digital signatures - or public-key certificates.'
Difffie-Hellman
Hashing
IPSEC BENEFIT
RSA
48. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
RSA
Hashing
Antireplay
Tunnel Mode (ipsec)
49. The receiving device decrypts the data with the third key.
IPSEC (main mode)
3DES
ISAKMP
ESP
50. Benefits are that the preshared authentication can be based on ID versus IP address and the speed of the process.
HMAC-MD5/HMAC-SHA
IPSEC (aggressive mode)
RSA
RSA
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests