Student Edition | Instructor Edition | Information Center | Home
TCP/IP Protocol Suite, 4/e
Student Edition
Student Solutions
Chapter 01 - Multi...
Chapter 02 - Multi...
Chapter 03 - Multi...
Chapter 04 - Multi...
Chapter 05 - Multi...
Chapter 06 - Multi...
Chapter 07 - Multi...
Chapter 08 - Multi...
Chapter 09 - Multi...
Chapter 10 - Multi...
Chapter 11 - Multi...
Chapter 12 - Multi...
Chapter 13 - Multi...
Chapter 14 - Multi...
Chapter 15 - Multi...
Chapter 16 - Multi...
Chapter 17 - Multi...
Chapter 18 - Multi...
Chapter 19 - Multi...
Chapter 20 - Multi...
Chapter 21 - Multi...
Chapter 22 - Multi...
Chapter 23 - Multi...
Chapter 24 - Multi...
Chapter 25 - Multi...
Chapter 26 - Multi...
Chapter 27 - Multi...
Chapter 28 - Multi...
Chapter 29 - Multi...
Chapter 30 - Multi...

Feedback
Help Center




Chapter 30 - Multiple Choice Quiz



1

VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
A)SSL; tunneling
B)IPSec; SSL
C)IPSec; tunneling
D)None of the choices are correct
2

Tunneling is a technique in which the IP datagram is first _______ and then _______.
A)encapsulated in another datagram; encrypted
B)encrypted; encapsulated in another datagram
C)authenticated; encrypted
D)encrypted; authenticated
3

IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.
A)data link
B)network
C)transport
D)None of the choices are correct
4

IPSec requires a logical connection between two hosts using a signaling protocol called ____________.
A)AS
B)SA
C)AS
D)None of the choices are correct
5

IPSec operates at two different modes: _________ mode and _________mode.
A)transport; network
B)transport; tunnel
C)tunnel; surface
D)None of the choices are correct
6

In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.
A)transport
B)tunnel
C)transition
D)None of the choices are correct
7

In the ________ mode, the IPSec header is placed in front of the original IP header.
A)transport
B)tunnel
C)transition
D)None of the choices are correct
8

IPSec defines two protocols: _________ and __________.
A)AH: SSP
B)ESP; SSP
C)AH: EH
D)None of the choices are correct
9

The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.
A)AH
B)ESP
C)SPE
D)None of the choices are correct
10

The _______ protocol provides message authentication and integrity, but not privacy.
A)AH
B)ESP
C)SPE
D)None of the choices are correct
11

The _______ protocol provides message authentication, integrity, and privacy.
A)AH
B)ESP
C)SPE
D)None of the choices are correct
12

The _______ was designed to provide security at the transport layer.
A)AH
B)ESP
C)TLS
D)None of the choices are correct
13

_______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
A)AH
B)ESP
C)TLS
D)None of the choices are correct
14

A packet-filter firewall filters at the ________ or ___________ layer.
A)network; application
B)transport; application
C)network; transport
D)None of the choices are correct
15

A proxy firewall filters at the __________ layer.
A)transport
B)network
C)application
D)None of the choices are correct