SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses the D-H algorithm to come to agreement over a public network.
ISAKMP
AH/ESP
IPSEC (main mode)
IKE
2. 'Digital signatures. Peer X encrypts a hash value with his private key and then sends the data to Peer Y. Peer Y obtains Peer X
IPSEC (phase2)
RSA
'IPSEC (phase1 -step3)'
RSA/DSA
3. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
Difffie-Hellman
RSA
message authentication codes (MAC).
3DES
4. Main mode establishes ISAKMP security association in six messages and performs authenticated D-H exchange.
IPSEC (main mode)
MD5
Tunneling
RSA
5. Provide authentication in Internet Key Exchange (IKE) Phase 2.
HMAC
Hashing
AES
IPSEC (aggressive mode)
6. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
DES
MD5
SHA
HMAC
7. You use this encryption method by keeping one key private and giving the other key to anyone in the public Internet. It does not matter who has your public key; it is useless without the private key.
3DES
AES
3DES
Asymetric Encryption Protocols
8. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
IPSEC (aggressive mode)
3DES
3DES
IKE
9. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
3DES
ISAKMP
IPSEC
AH/ESP
10. Has a trailer which identifies IPsec information and ESP integrity-check information.
3DES
DES
ESP
IPSEC (aggressive mode)
11. 'A 56-bit encryption algorithm - meaning the number of possible keys
HMAC-MD5/HMAC-SHA
AH
DSA
DES
12. ' is defined in RFC 3174. has as output a 160-bit value -'
SHA
IPSEC (aggressive mode)
IKE
GRE
13. 'requires that the sender and receiver have key pairs. By combining the sender
RSA
Difffie-Hellman
IPSEC (main mode)
RSA
14. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. Data integrity is the process of making sure data is not tampered with while it
RSA
IPSEC (main mode)
IPSEC BENEFIT
hash-based message authentication codes (HMAC).
16. More CPU intensive
Tunnel Mode (ipsec)
SHA
3DES
IPSEC (main mode)
17. Does not provide payload encryption.
'MD5 - SHA-1 - or RSA'
3DES
AH
IPSEC (aggressive mode)
18. 'can be achieved using one of three methods: preshared keys - encrypted nonces - or digital signatures.'
AH/ESP
RSA
3DES
Origin Auth (DH auth)
19. Key exchange for IPSEC
RSA
Hashing
DES
IKE
20. The receiving device decrypts the data with the third key.
IPSEC (phase2)
Difffie-Hellman
3DES
AH
21. IPsec implements using a shim header between L2 and L3
AH/ESP
Hashing
message authentication codes (MAC).
Tunnel Mode (ipsec)
22. Uses protocol number 50.
'MD5 - SHA-1 - or RSA'
IPSEC (aggressive mode)
ESP
Transport Mode (Ipsec)
23. It also provides protection for ISAKMP peer identities with encryption.
Hashing
hash-based message authentication codes (HMAC).
IPSEC (main mode)
Difffie-Hellman
24. 'The messages are authenticated - and the mechanisms that provide such integrity checks based on a secret key are usually called'
ESP
RSA/DSA
message authentication codes (MAC).
IPSEC (main mode)
25. No additional Layer 3 header is created. The original Layer 3 header is used.
ISAKMP
AH
Transport Mode (Ipsec)
IPSEC (main mode)
26. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
Difffie-Hellman
DSA
3DES
IPSEC (aggressive mode)
27. The receiving device then encrypts the data with the second key.
Difffie-Hellman
ESP
3DES
Asymetric Encryption Protocols
28. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
RSA
Hashing
3DES
RSA
29. 'group 2 identifies a 1024-bit key - group 2 is more secure - but slower to execute.'
ESP
Difffie-Hellman
Tunnel Mode (ipsec)
Hashing
30. Can be implemented efficiently on a wide range of processors and in hardware.
AH/ESP
DSA
AES
Antireplay
31. Origin authentication validates the origin of a message upon receipt; this process is done during initial communications.
ESP
IPSEC (aggressive mode)
IPSEC (main mode)
IPSEC BENEFIT
32. 'group 1 identifies a 768-bit key - group 1 is faster to execute - but it is less secure -'
Asymetric Encryption Protocols
Difffie-Hellman
'IPSEC (phase1 -step3)'
Transport Mode (Ipsec)
33. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
HMAC
'DES - 3DES - or AES.'
DES
IPSEC (aggressive mode)
34. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. 'Encryption - where Peer X uses Peer Y
RSA
3DES
Transport Mode (Ipsec)
Difffie-Hellman
36. 'in most cases - this mode is preferred with certificates.'
SHA
Asymetric Encryption Protocols
AH/ESP
IPSEC (main mode)
37. Is a two-phase protocol: The first phase establishes a secure authenticated channel and the second phase is where SAs are negotiated on behalf of the IPsec services.
Difffie-Hellman
DES
RSA
IKE
38. Provides authentication and encryption of the payload.
Origin Auth (DH auth)
'IPSEC (phase1 -step2)'
Difffie-Hellman
ESP
39. 'DSA is roughly the same speed as RSA when creating signatures - but 10 to 40 times slower when verifying signatures. Because verification happens more frequently than creation - this issue is worth noting when deploying DSA in any environment.'
Hashing
GRE
DSA
RSA/DSA
40. Invented by Ron Rivest of RSA Security (RFC 1321).
SHA
Difffie-Hellman
MD5
3DES
41. Uses protocol number 51.
SHA
AH
3DES
3DES
42. 'key exchange is vulnerable to a man-in-the-middle attack. You can rectify this problem by allowing the two parties to authenticate themselves to each other with a shared secret key - digital signatures - or public-key certificates.'
ISAKMP
Difffie-Hellman
SHA
AH/ESP
43. A variable block- length and key-length cipher.
Difffie-Hellman
AES
AH
IPSEC (main mode)
44. DoS attacks are more probable with this mode.
IPSEC (aggressive mode)
message authentication codes (MAC).
DSA
IKE
45. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. IPSec SAs are negotiated and protected by the existing IPsec SA.
MD5
AH
RSA
IPSEC (phase2)
47. Uses IKE for key exchange.
3DES
Hashing
ISAKMP
3DES
48. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
Asymetric Encryption Protocols
'IPSEC (phase1 -step3)'
IPSEC (phase2)
3DES
49. 'provides everything required to securely connect over a public media - such as the Internet.'
IPSEC
SHA
IKE
RSA
50. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
DES
Difffie-Hellman
MD5
ESP
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests