Deck 9: Ip Security

Full screen (f)
exit full mode
Question
An end user whose system is equipped with IP security protocols can make a local call to an ISP and gain secure access to a company network.
Use Space or
up arrow
down arrow
to flip the card.
Question
Transport mode provides protection to the entire IP packet.
Question
The Security Parameters Index identifies a security association.
Question
The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley.
Question
Authentication applied to the entire original IP packet is _________ .

A)security mode
B)cipher mode
C)tunnel mode
D)transport mode
Question
The Payload Data Field is designed to deter replay attacks.
Question
IPsec is executed on a packet-by-packet basis.
Question
IPSec can guarantee that all traffic designated by the network administrator is authenticated but cannot guarantee that it is encrypted.
Question
Both tunnel and transport modes can be accommodated by the encapsulating security payload encryption format.
Question
The principal feature of IPsec is that it can encrypt and/or authenticate all traffic at the IP level.
Question
_________ defines a number of techniques for key management.

A)KEP
B)KMP
C)SKE
D)IKE
Question
Authentication must be applied to the entire original IP packet.
Question
By implementing security at the IP level an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security ignorant applications.
Question
The __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the packet has not been altered in transit.

A)confidentiality
B)authentication
C)security
D)key management
Question
An individual SA can implement both the AH and the ESP protocol.
Question
__________ provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet.

A)IKE
B)ISA
C)IAB
D)IPsec
Question
Any traffic from the local host to a remote host for purposes of an IKE exchange bypasses the IPsec processing.
Question
Additional padding may be added to provide partial traffic flow confidentiality by concealing the actual length of the payload.
Question
Authentication applied to all of the packet except for the IP header is _________ .

A)tunnel mode
B)transport mode
C)association mode
D)security mode
Question
IP security is a capability that can be added to either current version of the Internet Protocol by means of additional headers.
Question
The __________ facility is concerned with the secure exchange of keys.
Question
A security association is uniquely identified by three parameters: Security Protocol Identifier, IP Destination Address, and ________ .
Question
_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.

A)Security Parameters Index
B)Next Header
C)Sequence Header
D)Payload Data
Question
A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination.
Question
A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.

A)SAD
B)SPD
C)SA
D)SPI
Question
IPsec encompasses three functional areas: authentication, key management, and __________ .
Question
The __________ payload contains either error or status information associated with this SA or this SA negotiation.

A)Encrypted
B)Notify
C)Configuration
D)Nonce
Question
A value chosen by the responder to identify a unique IKE SA is a _________ .

A)Initiator SPI
B)Responder Cookie
C)Flag
D)Message ID
Question
IKE key determination employs __________ to ensure against replay attacks.

A)cookies
B)groups
C)flags
D)nonces
Question
Authentication makes use of the _________ message authentication code.
Question
The _________ payload allows peers to identify packet flows for processing by IPsec services.

A)Configuration
B)Vendor ID
C)Traffic Selector
D)Extensible Authentication Protocol
Question
The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .

A)IAB
B)SPI
C)ESP
D)SPD
Question
IPsec policy is determined primarily by the interaction of two databases: The security policy database and the __________ .
Question
IPsec provides security services at the ________ layer by enabling a system to select required security protocols, determine the algorithms to use for the services and put in place any cryptographic keys required to provide the requested services.
Question
_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.The current specification is RFC 4303.

A)SPI
B)ESP
C)ISA
D)IPsec
Question
_________ can be used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service, and traffic flow confidentiality.
Question
The means by which IP traffic is related to specific SAs is the _________ .

A)TRS
B)SPD
C)SAD
D)SPI
Question
_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec.
Question
Confidentiality is provided by an encryption format known as __________ .
Question
The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.

A)security
B)key management
C)authentication
D)confidentiality
Question
The term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.
Question
At any point in an IKE exchange the sender may include a _________ payload to request the certificate of the other communicating entity.
Question
Three different authentication methods can be used with IKE key determination: Public key encryption, symmetric key encryption, and _________ .
Question
The selectors that determine a Security Policy Database are: Name, Local and Remote Ports, Next Layer Protocol, Remote IP Address, and _________ .
Question
Generic in that it does not dictate specific formats, the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Ip Security
1
An end user whose system is equipped with IP security protocols can make a local call to an ISP and gain secure access to a company network.
True
2
Transport mode provides protection to the entire IP packet.
False
3
The Security Parameters Index identifies a security association.
True
4
The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Authentication applied to the entire original IP packet is _________ .

A)security mode
B)cipher mode
C)tunnel mode
D)transport mode
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The Payload Data Field is designed to deter replay attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
IPsec is executed on a packet-by-packet basis.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
IPSec can guarantee that all traffic designated by the network administrator is authenticated but cannot guarantee that it is encrypted.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Both tunnel and transport modes can be accommodated by the encapsulating security payload encryption format.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The principal feature of IPsec is that it can encrypt and/or authenticate all traffic at the IP level.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
_________ defines a number of techniques for key management.

A)KEP
B)KMP
C)SKE
D)IKE
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Authentication must be applied to the entire original IP packet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
By implementing security at the IP level an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security ignorant applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the packet has not been altered in transit.

A)confidentiality
B)authentication
C)security
D)key management
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
An individual SA can implement both the AH and the ESP protocol.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
__________ provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet.

A)IKE
B)ISA
C)IAB
D)IPsec
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Any traffic from the local host to a remote host for purposes of an IKE exchange bypasses the IPsec processing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Additional padding may be added to provide partial traffic flow confidentiality by concealing the actual length of the payload.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Authentication applied to all of the packet except for the IP header is _________ .

A)tunnel mode
B)transport mode
C)association mode
D)security mode
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
IP security is a capability that can be added to either current version of the Internet Protocol by means of additional headers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The __________ facility is concerned with the secure exchange of keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A security association is uniquely identified by three parameters: Security Protocol Identifier, IP Destination Address, and ________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.

A)Security Parameters Index
B)Next Header
C)Sequence Header
D)Payload Data
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
A __________ attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.

A)SAD
B)SPD
C)SA
D)SPI
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
IPsec encompasses three functional areas: authentication, key management, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The __________ payload contains either error or status information associated with this SA or this SA negotiation.

A)Encrypted
B)Notify
C)Configuration
D)Nonce
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A value chosen by the responder to identify a unique IKE SA is a _________ .

A)Initiator SPI
B)Responder Cookie
C)Flag
D)Message ID
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
IKE key determination employs __________ to ensure against replay attacks.

A)cookies
B)groups
C)flags
D)nonces
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Authentication makes use of the _________ message authentication code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The _________ payload allows peers to identify packet flows for processing by IPsec services.

A)Configuration
B)Vendor ID
C)Traffic Selector
D)Extensible Authentication Protocol
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .

A)IAB
B)SPI
C)ESP
D)SPD
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
IPsec policy is determined primarily by the interaction of two databases: The security policy database and the __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
IPsec provides security services at the ________ layer by enabling a system to select required security protocols, determine the algorithms to use for the services and put in place any cryptographic keys required to provide the requested services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
_________ consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication.The current specification is RFC 4303.

A)SPI
B)ESP
C)ISA
D)IPsec
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
_________ can be used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service, and traffic flow confidentiality.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The means by which IP traffic is related to specific SAs is the _________ .

A)TRS
B)SPD
C)SAD
D)SPI
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Confidentiality is provided by an encryption format known as __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.

A)security
B)key management
C)authentication
D)confidentiality
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
At any point in an IKE exchange the sender may include a _________ payload to request the certificate of the other communicating entity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
Three different authentication methods can be used with IKE key determination: Public key encryption, symmetric key encryption, and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The selectors that determine a Security Policy Database are: Name, Local and Remote Ports, Next Layer Protocol, Remote IP Address, and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Generic in that it does not dictate specific formats, the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.