SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Sec Encryption Ipsec
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccie
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses the D-H algorithm to come to agreement over a public network.
AH
IKE
AH
HMAC-MD5/HMAC-SHA
2. 'provides everything required to securely connect over a public media - such as the Internet.'
IPSEC
AES
3DES
Hashing
3. Verify whether the data has been altered.
Difffie-Hellman
SHA
IKE
Hashing
4. Has a trailer which identifies IPsec information and ESP integrity-check information.
ESP
RSA
IPSEC
Difffie-Hellman
5. Where the original Layer 3 header and payload inside an IPsec packet is encapsulated. Tunnel mode does add overhead to each packet and uses some additional CPU resources.
IKE
Tunnel Mode (ipsec)
IKE
SHA
6. Uses protocol number 51.
AH/ESP
RSA
AH
Tunnel Mode (ipsec)
7. Data integrity is the process of making sure data is not tampered with while it
DES
IPSEC BENEFIT
'MD5 - SHA-1 - or RSA'
Transport Mode (Ipsec)
8. 'is a block-cipher algorithm - which means that it performs operations on fixed-length data streams of 64-bit blocks. The key ostensibly consists of 64 bits; however - only 56 are actually used by the algorithm.'
DES
3DES
'IPSEC (phase1 -step2)'
IPSEC BENEFIT
9. Takes variable-length clear-text data to produce fixed-length hashed data that is unreadable.
hash-based message authentication codes (HMAC).
AH/ESP
ESP
MD5
10. The receiving device decrypts the data with the third key.
3DES
IPSEC BENEFIT
RSA
IKE
11. Can be implemented efficiently on a wide range of processors and in hardware.
Difffie-Hellman
AES
IPSEC (aggressive mode)
Tunnel Mode (ipsec)
12. 'A 56-bit encryption algorithm - meaning the number of possible keys
Difffie-Hellman
IPSEC (aggressive mode)
DES
3DES
13. Common key size is 1024 bits.
RSA
IPSEC (aggressive mode)
IPSEC (main mode)
Difffie-Hellman
14. IPSec SAs are negotiated and protected by the existing IPsec SA.
AES
ESP
IPSEC (phase2)
GRE
15. 'establishes ISAKMP SA in three messages -because it negotiates a ISAKMP policy and a DJ nonce exchange together.'
IPSEC (main mode)
IPSEC (aggressive mode)
IKE
'DES - 3DES - or AES.'
16. IPSEC tunnels data through IP using one of two protocols?
'IPSEC (phase1 -step2)'
IKE
Origin Auth (DH auth)
AH/ESP
17. Negotiation of the ISAKMP policy by offering and acceptance of protection suites
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. ' is defined in RFC 3174. has as output a 160-bit value -'
IKE
Difffie-Hellman
ESP
SHA
19. Used in government installs and was created to work with the SHA-1 hash algorithm.
DSA
Asymetric Encryption Protocols
IKE
Difffie-Hellman
20. No additional Layer 3 header is created. The original Layer 3 header is used.
Transport Mode (Ipsec)
DSA
3DES
Difffie-Hellman
21. 'group 1 identifies a 768-bit key - group 1 is faster to execute - but it is less secure -'
GRE
ESP
Difffie-Hellman
AH
22. One of the most popular tunneling protocols is
ESP
DSA
GRE
Origin Auth (DH auth)
23. RFC 2631 on the workings of the key generation/exchange process.
Difffie-Hellman
Asymetric Encryption Protocols
RSA
message authentication codes (MAC).
24. A
AH
Difffie-Hellman
DSA
Hashing
25. 'The sending device decrypts the data with the second key - which is also 56 bits in length.'
'IPSEC (phase1 -step3)'
IPSEC (aggressive mode)
3DES
Difffie-Hellman
26. Benefits are that the preshared authentication can be based on ID versus IP address and the speed of the process.
IPSEC (aggressive mode)
IKE
IKE
IPSEC (main mode)
27. Message of arbitrary length is taken as input and produces as output a 128-bit fingerprint or message digest of the input.
MD5
ESP
Asymetric Encryption Protocols
GRE
28. You check it by hashing data and appending the hash value to the data as you send it across the network to a peer.
RSA
Hashing
'IPSEC (phase1 -step1)'
IPSEC (aggressive mode)
29. Key exchange for IPSEC
'MD5 - SHA-1 - or RSA'
IPSEC (main mode)
IKE
RSA
30. 'When using the hash-based key function -'
Tunnel Mode (ipsec)
HMAC-MD5/HMAC-SHA
Origin Auth (DH auth)
RSA
31. 'The messages are authenticated - and the mechanisms that provide such integrity checks based on a secret key are usually called'
message authentication codes (MAC).
IPSEC (aggressive mode)
Asymetric Encryption Protocols
DSA
32. 'group 2 identifies a 1024-bit key - group 2 is more secure - but slower to execute.'
ESP
IPSEC (aggressive mode)
Difffie-Hellman
RSA
33. IPSEC performs this function by using a sequence field in the IPsec header combined with integrity checks.
3DES
DES
SHA
Antireplay
34. The DES algorithm that performs 3 times sequentially.
Difffie-Hellman
3DES
IPSEC BENEFIT
Difffie-Hellman
35. Does not provide payload encryption.
IPSEC (main mode)
IPSEC (main mode)
Hashing
AH
36. Act of encapsulating a packet within another packet.
3DES
IPSEC (aggressive mode)
Tunneling
IPSEC (phase2)
37. 'defines the mode of communication - creation - and management of security associations.'
HMAC
ISAKMP
IKE
DES
38. Turns clear-text data into cipher text with an encryption algorithm. The receiving station decrypts the data from cipher text into clear text. The encryption key is a shared secret key that encrypts and decrypts messages.
SHA
DES
AES
IPSEC (main mode)
39. Negotiation of a shared secret key for encryption of the IKE session using the D-H algorithm
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. IPSEC Encryption is performed by
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. You use this encryption method by keeping one key private and giving the other key to anyone in the public Internet. It does not matter who has your public key; it is useless without the private key.
Asymetric Encryption Protocols
DSA
AH/ESP
ISAKMP
42. 'often called public-key algorithms - do not rely on a randomly generated shared encryption key; instead - they create two static keys. These static keys are completely different - but mathematically bound to each other; what one key encrypts - the o
Asymetric Encryption Protocols
AH/ESP
IPSEC (main mode)
RSA
43. Invented by Ron Rivest of RSA Security (RFC 1321).
SHA
'DES - 3DES - or AES.'
DSA
MD5
44. Origin authentication validates the origin of a message upon receipt; this process is done during initial communications.
Origin Auth (DH auth)
AH/ESP
IPSEC BENEFIT
3DES
45. 'including Internet Security Association and Key Management Protocol (ISAKMP) - Secure Key Exchange Mechanism for the Internet (SKEME) - and Oakley.'
3DES
hash algorithms
IPSEC (aggressive mode)
IKE
46. 'Three keys encrypt the data - which results in a 168-bit encryption key. The sending device encrypts the data with the first 56-bit key.'
IPSEC
MD5
3DES
Difffie-Hellman
47. Uses protocol number 50.
Asymetric Encryption Protocols
'IPSEC (phase1 -step3)'
DES
ESP
48. ID exchange and authentication of D-H key by using the reply to the received nonce or string of bits
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. 'in most cases - this mode is preferred with certificates.'
ISAKMP
SHA
IPSEC (main mode)
Tunnel Mode (ipsec)
50. It also provides protection for ISAKMP peer identities with encryption.
Tunneling
IPSEC (aggressive mode)
message authentication codes (MAC).
IPSEC (main mode)