Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cryptography and Network Security
Quiz 20: Ip Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
_________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.
Question 22
Multiple Choice
A value chosen by the responder to identify a unique IKE SA is a _________ .
Question 23
Short Answer
_________ mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPsec.
Question 24
Multiple Choice
the __________ payload contains either error or status information associated with this SA or this SA negotiation.
Question 25
Multiple Choice
IKE key determination employs __________ to ensure against replay attacks.
Question 26
Short Answer
the __________ facility is concerned with the secure exchange of keys.
Question 27
Short Answer
A security association is uniquely identified by three parameters: Security Protocol Identifier, IP Destination Address, and ________ .
Question 28
Multiple Choice
the _________ payload allows IKE SAs to be authenticated using EAP.
Question 29
Multiple Choice
A _________ is a one way relationship between a sender and a receiver that affords security services to the traffic carried on it.
Question 30
Short Answer
the __________ exchange requires that each side send a pseudorandom number in the initial message, which the other side acknowledges.
Question 31
Short Answer
__________ can be used to secure communication with other organizations, ensuring authentication and confidentiality and providing a key exchange mechanism.
Question 32
Multiple Choice
_________ identifies the type of data contained in the payload data field by identifying the first header in that payload.
Question 33
Short Answer
IPsec provides security services at the ________ layer by enabling a system to select required security protocols, determine the algorithms to use for the services and put in place any cryptographic keys required to provide the requested services.