SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 'When using the hash-based key function -'
HMAC-MD5/HMAC-SHA
IPSEC (phase2)
AH/ESP
AES
2. A
DES
SHA
Hashing
3DES
3. 'group 1 identifies a 768-bit key - group 1 is faster to execute - but it is less secure -'
3DES
IKE
AES
Difffie-Hellman
4. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
AES
AH
3DES
Hashing
5. The protocol of choice for key management and establishing security associations between peers on the Internet.
SHA
RSA
ISAKMP
Difffie-Hellman
6. 'Encryption - where Peer X uses Peer Y
hash algorithms
IPSEC (aggressive mode)
DSA
RSA
7. Common key size is 1024 bits.
DES
RSA
MD5
3DES
8. Data integrity is the process of making sure data is not tampered with while it
IPSEC BENEFIT
AES
AH
ESP
9. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
3DES
Antireplay
HMAC
IPSEC (aggressive mode)
10. IPsec implements using a shim header between L2 and L3
SHA
IPSEC (aggressive mode)
SHA
AH/ESP
11. Does not provide payload encryption.
Difffie-Hellman
AH
AH/ESP
IPSEC (phase2)
12. More CPU intensive
AH/ESP
SHA
hash-based message authentication codes (HMAC).
Tunnel Mode (ipsec)
13. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
message authentication codes (MAC).
IPSEC BENEFIT
IKE
IPSEC (main mode)
14. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
Difffie-Hellman
Hashing
DES
Difffie-Hellman
15. Used for integrity checks on peer and data sent by peer and for authentication checks.
AH
hash-based message authentication codes (HMAC).
Hashing
3DES
16. Is a two-phase protocol: The first phase establishes a secure authenticated channel and the second phase is where SAs are negotiated on behalf of the IPsec services.
ESP
Asymetric Encryption Protocols
IKE
ESP
17. 'in most cases - this mode is preferred with certificates.'
3DES
ESP
RSA
IPSEC (main mode)
18. 'Created by NIST in 1994 - is the algorithm used for digital signatures but not for encryption.'
IPSEC (main mode)
DSA
Difffie-Hellman
Hashing
19. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. Used in IPsec for two discreet purposes:
ESP
RSA
IPSEC
IPSEC (phase2)
21. Provide authentication in Internet Key Exchange (IKE) Phase 2.
3DES
HMAC
SHA
MD5
22. 'has a Next Protocol field which identifies the next Layer 4 transport protocol in use - TCP or UDP'
AH/ESP
ISAKMP
IPSEC BENEFIT
GRE
23. The sending device encrypts for a final time with another 56-bit key.
3DES
IPSEC BENEFIT
ISAKMP
RSA
24. Uses protocol number 51.
HMAC
HMAC-MD5/HMAC-SHA
AES
AH
25. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
IPSEC BENEFIT
Difffie-Hellman
IPSEC (main mode)
DES
26. Main mode establishes ISAKMP security association in six messages and performs authenticated D-H exchange.
IPSEC (main mode)
3DES
ISAKMP
3DES
27. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
MD5
3DES
ESP
Tunneling
28. Key exchange for IPSEC
IPSEC (aggressive mode)
AH/ESP
IKE
Difffie-Hellman
29. 'MACs with hash algorithms -'
hash-based message authentication codes (HMAC).
HMAC-MD5/HMAC-SHA
3DES
ISAKMP
30. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. 'can be achieved using one of three methods: preshared keys - encrypted nonces - or digital signatures.'
'MD5 - SHA-1 - or RSA'
Asymetric Encryption Protocols
IKE
Origin Auth (DH auth)
32. 'group 2 identifies a 1024-bit key - group 2 is more secure - but slower to execute.'
Difffie-Hellman
IKE
RSA/DSA
IPSEC (main mode)
33. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
'IPSEC (phase1 -step3)'
MD5
DSA
RSA
35. 'defines the mode of communication - creation - and management of security associations.'
MD5
DES
ISAKMP
IPSEC (aggressive mode)
36. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
SHA
MD5
IPSEC (phase2)
Hashing
37. 'is a more secure version of MD5 - and hash-based message authentication codes (HMAC) provides further security with the inclusion of a key-based hash.'
AH/ESP
3DES
IPSEC (aggressive mode)
SHA
38. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
RSA
MD5
IPSEC (main mode)
Hashing
39. 'including Internet Security Association and Key Management Protocol (ISAKMP) - Secure Key Exchange Mechanism for the Internet (SKEME) - and Oakley.'
3DES
RSA
IKE
Difffie-Hellman
40. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. 'requires that the sender and receiver have key pairs. By combining the sender
Difffie-Hellman
IKE
IKE
Asymetric Encryption Protocols
42. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
SHA
3DES
Difffie-Hellman
AH/ESP
43. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
IPSEC
SHA
RSA
3DES
44. This mode does not support identity protection or protection against clogging attacks and spoofing.
Hashing
IPSEC (aggressive mode)
IKE
Hashing
45. Has a trailer which identifies IPsec information and ESP integrity-check information.
Tunneling
SHA
ESP
DSA
46. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
ESP
IPSEC
3DES
DSA
47. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. That authenticate data packets and ensure that data is not tampered with or modified.
MD5
ISAKMP
Tunnel Mode (ipsec)
hash algorithms
49. 'Finally - the receiving devices decrypt the data with the first key.'
3DES
AH
IKE
Hashing
50. It uses UDP 500 and is defined by RFC 2409.
SHA
AH/ESP
Difffie-Hellman
IKE