SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Used in IPsec for two discreet purposes:
DES
RSA
IPSEC BENEFIT
IKE
3. Used in government installs and was created to work with the SHA-1 hash algorithm.
IKE
'DES - 3DES - or AES.'
message authentication codes (MAC).
DSA
4. Act of encapsulating a packet within another packet.
RSA
GRE
Tunneling
AH/ESP
5. 'Encryption - where Peer X uses Peer Y
'IPSEC (phase1 -step1)'
Difffie-Hellman
RSA
IPSEC (main mode)
6. A variable block- length and key-length cipher.
DES
AES
IPSEC BENEFIT
IPSEC BENEFIT
7. The receiving device decrypts the data with the third key.
Tunneling
'IPSEC (phase1 -step3)'
3DES
IPSEC (main mode)
8. 'provides everything required to securely connect over a public media - such as the Internet.'
DSA
ISAKMP
'IPSEC (phase1 -step3)'
IPSEC
9. IPSEC tunnels data through IP using one of two protocols?
RSA
AH
AH/ESP
IKE
10. 'Developed in 1977 by Ronald Rivest - Adi Shamir - and Leonard Adleman (therefore - RSA).'
AH/ESP
Origin Auth (DH auth)
RSA
AES
11. No additional Layer 3 header is created. The original Layer 3 header is used.
Hashing
Transport Mode (Ipsec)
Difffie-Hellman
IPSEC (aggressive mode)
12. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
DES
ISAKMP
Tunneling
message authentication codes (MAC).
13. Main mode establishes ISAKMP security association in six messages and performs authenticated D-H exchange.
IPSEC BENEFIT
MD5
IPSEC (main mode)
Hashing
14. Origin authentication validates the origin of a message upon receipt; this process is done during initial communications.
SHA
AH
IPSEC BENEFIT
MD5
15. IPSEC performs this function by using a sequence field in the IPsec header combined with integrity checks.
Antireplay
IKE
3DES
AES
16. 'Finally - the receiving devices decrypt the data with the first key.'
RSA/DSA
3DES
hash-based message authentication codes (HMAC).
RSA
17. 'algorithm encrypts and decrypts data three times with 3 different keys - effectively creating a 168-bit key.'
3DES
IPSEC
hash algorithms
Hashing
18. Uses the D-H algorithm to come to agreement over a public network.
3DES
IKE
Hashing
IPSEC
19. It also provides protection for ISAKMP peer identities with encryption.
AES
IPSEC (main mode)
Hashing
Origin Auth (DH auth)
20. 'produces a 160-bit hash output - which makes it more difficult to decipher.'
RSA
Difffie-Hellman
3DES
SHA
21. Hybrid protocol that defines the mechanism to derive authenticated keying material and negotiation of security associations (SA).
IPSEC (aggressive mode)
IPSEC
IKE
'IPSEC (phase1 -step2)'
22. Verify whether the data has been altered.
3DES
DSA
'MD5 - SHA-1 - or RSA'
Hashing
23. Provides authentication and encryption of the payload.
'MD5 - SHA-1 - or RSA'
IPSEC
Asymetric Encryption Protocols
ESP
24. Uses IKE for key exchange.
IPSEC (main mode)
ISAKMP
Tunnel Mode (ipsec)
Difffie-Hellman
25. Drawback of this is that the hash is passed unencrypted and is susceptible to PSK crack attacks.
3DES
IPSEC (aggressive mode)
DES
SHA
26. More CPU intensive
IPSEC (aggressive mode)
SHA
ESP
ISAKMP
27. 'including Internet Security Association and Key Management Protocol (ISAKMP) - Secure Key Exchange Mechanism for the Internet (SKEME) - and Oakley.'
IKE
RSA
3DES
Tunnel Mode (ipsec)
28. 'requires that the sender and receiver have key pairs. By combining the sender
IKE
MD5
Difffie-Hellman
IPSEC (aggressive mode)
29. Main disadvantage of asymmetric algorithms is that they are slow.
IPSEC BENEFIT
MD5
AES
RSA/DSA
30. Invented by Ron Rivest of RSA Security (RFC 1321).
SHA
MD5
Difffie-Hellman
Origin Auth (DH auth)
31. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
IKE
3DES
Difffie-Hellman
MD5
32. 'It is not used for encryption or digital signatures; it is used to obtain a shared secret
Difffie-Hellman
ISAKMP
IPSEC (phase2)
ISAKMP
33. 'Created by NIST in 1994 - is the algorithm used for digital signatures but not for encryption.'
RSA
'IPSEC (phase1 -step2)'
DSA
'IPSEC (phase1 -step3)'
34. Common key size is 1024 bits.
AH
AES
RSA
Difffie-Hellman
35. This mode does not support identity protection or protection against clogging attacks and spoofing.
Origin Auth (DH auth)
IPSEC (phase2)
IKE
IPSEC (aggressive mode)
36. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
IPSEC (aggressive mode)
IPSEC
MD5
Asymetric Encryption Protocols
37. 'A 56-bit encryption algorithm - meaning the number of possible keys
DES
DSA
GRE
'IPSEC (phase1 -step2)'
38. The receiving device then encrypts the data with the second key.
3DES
IKE
DES
IPSEC (phase2)
39. 'group 5 identifies a 1536-bit key - provides for highest security but is the slowest of all groups.'
DSA
Difffie-Hellman
HMAC
IPSEC (main mode)
40. Provide authentication in Internet Key Exchange (IKE) Phase 2.
HMAC
AH/ESP
SHA
IPSEC BENEFIT
41. Does not provide payload encryption.
Origin Auth (DH auth)
AH
Tunnel Mode (ipsec)
hash-based message authentication codes (HMAC).
42. The DES algorithm that performs 3 times sequentially.
Difffie-Hellman
ESP
3DES
'IPSEC (phase1 -step3)'
43. RFC 2631 on the workings of the key generation/exchange process.
Difffie-Hellman
Tunneling
IPSEC (aggressive mode)
3DES
44. Is a two-phase protocol: The first phase establishes a secure authenticated channel and the second phase is where SAs are negotiated on behalf of the IPsec services.
SHA
IKE
Asymetric Encryption Protocols
ISAKMP
45. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
MD5
3DES
ESP
Tunneling
46. 'can be achieved using one of three methods: preshared keys - encrypted nonces - or digital signatures.'
Origin Auth (DH auth)
message authentication codes (MAC).
RSA/DSA
IPSEC (main mode)
47. Data integrity is the process of making sure data is not tampered with while it
IPSEC BENEFIT
3DES
RSA
AH
48. 'is a block-cipher algorithm - which means that it performs operations on fixed-length data streams of 64-bit blocks. The key ostensibly consists of 64 bits; however - only 56 are actually used by the algorithm.'
IPSEC (main mode)
DES
Asymetric Encryption Protocols
hash algorithms
49. Uses protocol number 51.
Difffie-Hellman
DSA
AH
GRE
50. Can be implemented efficiently on a wide range of processors and in hardware.
AES
IPSEC (aggressive mode)
SHA
Hashing