SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
DES
HMAC-MD5/HMAC-SHA
IPSEC (aggressive mode)
AES
2. A
Hashing
RSA
3DES
MD5
3. The DES algorithm that performs 3 times sequentially.
3DES
IPSEC (aggressive mode)
MD5
Asymetric Encryption Protocols
4. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. Provides authentication and encryption of the payload.
IPSEC (main mode)
ESP
IKE
'MD5 - SHA-1 - or RSA'
6. 'When using the hash-based key function -'
HMAC-MD5/HMAC-SHA
AH
DSA
RSA
7. That authenticate data packets and ensure that data is not tampered with or modified.
AES
'IPSEC (phase1 -step2)'
hash algorithms
AH
8. It also provides protection for ISAKMP peer identities with encryption.
SHA
IKE
IPSEC BENEFIT
IPSEC (main mode)
9. 'The messages are authenticated - and the mechanisms that provide such integrity checks based on a secret key are usually called'
AH
DSA
HMAC
message authentication codes (MAC).
10. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
IPSEC (aggressive mode)
Difffie-Hellman
AES
3DES
11. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
SHA
RSA
AH/ESP
Origin Auth (DH auth)
12. 'often called public-key algorithms - do not rely on a randomly generated shared encryption key; instead - they create two static keys. These static keys are completely different - but mathematically bound to each other; what one key encrypts - the o
SHA
Asymetric Encryption Protocols
3DES
Difffie-Hellman
13. 'A 56-bit encryption algorithm - meaning the number of possible keys
Difffie-Hellman
DES
GRE
ESP
14. Does not provide payload encryption.
AH
IPSEC (main mode)
Difffie-Hellman
IKE
15. 'defines the mode of communication - creation - and management of security associations.'
AH/ESP
AH
ISAKMP
RSA
16. 'group 2 identifies a 1024-bit key - group 2 is more secure - but slower to execute.'
Difffie-Hellman
Asymetric Encryption Protocols
DSA
SHA
17. IPSec SAs are negotiated and protected by the existing IPsec SA.
Asymetric Encryption Protocols
IPSEC (phase2)
HMAC
3DES
18. Integrity checks are done
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
Difffie-Hellman
IKE
Hashing
ISAKMP
20. Uses protocol number 50.
3DES
3DES
ESP
Asymetric Encryption Protocols
21. Verify whether the data has been altered.
Antireplay
AH
Hashing
IKE
22. A variable block- length and key-length cipher.
Hashing
AES
IKE
HMAC-MD5/HMAC-SHA
23. The receiving device decrypts the data with the third key.
3DES
ESP
Origin Auth (DH auth)
IKE
24. More CPU intensive
3DES
HMAC
AH
SHA
25. Main mode establishes ISAKMP security association in six messages and performs authenticated D-H exchange.
Hashing
IPSEC (main mode)
HMAC
IKE
26. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
IKE
'IPSEC (phase1 -step3)'
IPSEC (aggressive mode)
Hashing
27. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
Difffie-Hellman
3DES
DSA
Tunneling
28. The receiving device then encrypts the data with the second key.
IKE
3DES
IKE
Antireplay
29. The sending device encrypts for a final time with another 56-bit key.
Antireplay
3DES
hash algorithms
IKE
30. 'Encryption - where Peer X uses Peer Y
IPSEC (aggressive mode)
Transport Mode (Ipsec)
RSA
AH/ESP
31. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
Difffie-Hellman
MD5
IPSEC (aggressive mode)
RSA/DSA
32. Provide authentication in Internet Key Exchange (IKE) Phase 2.
HMAC
DSA
IPSEC BENEFIT
Tunneling
33. The protocol of choice for key management and establishing security associations between peers on the Internet.
IPSEC (aggressive mode)
Tunneling
ISAKMP
ESP
34. 'requires that the sender and receiver have key pairs. By combining the sender
Difffie-Hellman
RSA/DSA
SHA
MD5
35. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
IPSEC (aggressive mode)
MD5
IKE
ISAKMP
36. 'DSA is roughly the same speed as RSA when creating signatures - but 10 to 40 times slower when verifying signatures. Because verification happens more frequently than creation - this issue is worth noting when deploying DSA in any environment.'
DES
DSA
ESP
SHA
37. This mode does not support identity protection or protection against clogging attacks and spoofing.
AES
IPSEC (aggressive mode)
3DES
RSA
38. Main disadvantage of asymmetric algorithms is that they are slow.
RSA/DSA
IKE
SHA
3DES
39. IPSEC tunnels data through IP using one of two protocols?
Hashing
IPSEC (main mode)
AH
AH/ESP
40. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
'IPSEC (phase1 -step1)'
SHA
MD5
GRE
42. Invented by Ron Rivest of RSA Security (RFC 1321).
SHA
MD5
Difffie-Hellman
IPSEC (main mode)
43. One of the most popular tunneling protocols is
IPSEC (aggressive mode)
ISAKMP
GRE
MD5
44. IPsec implements using a shim header between L2 and L3
SHA
Transport Mode (Ipsec)
AH/ESP
Tunneling
45. Common key size is 1024 bits.
IPSEC (main mode)
3DES
IPSEC (main mode)
RSA
46. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
47. Used for integrity checks on peer and data sent by peer and for authentication checks.
ESP
3DES
AH
RSA
48. 'key lengths are 128 - 192 - or 256 bits to encrypt blocks of equal length.'
AES
Hashing
Antireplay
RSA/DSA
49. DoS attacks are more probable with this mode.
AH/ESP
IKE
IPSEC (aggressive mode)
'IPSEC (phase1 -step1)'
50. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
ESP
RSA
Origin Auth (DH auth)
IPSEC (main mode)