Site MapHelpFeedbackQuizzes
Quizzes
(See related pages)

1
VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
A)SSL; tunneling
B)IPSec; SSL
C)IPSec; tunneling
D)None of the choices are correct
2
IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.
A)data-link
B)network
C)transport
D)None of the choices are correct
3
IPSec requires a logical connection between two hosts using a signaling protocol called ____________.
A)AS
B)SA
C)AS
D)None of the choices are correct
4
IPSec operates at two different modes: _________ mode and _________mode.
A)transport; network
B)transport; tunnel
C)tunnel; surface
D)None of the choices are correct
5
In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.
A)transport
B)tunnel
C)transition
D)None of the choices are correct
6
In the ________ mode, the IPSec header is placed in front of the original IP header.
A)transport
B)tunnel
C)transition
D)None of the choices are correct
7
IPSec defines two protocols: _________ and __________.
A)AH; SSP
B)ESP; SSP
C)AH; EH
D)None of the choices are correct
8
The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.
A)AH
B)ESP
C)SPE
D)None of the choices are correct
9
The _______ protocol provides message authentication and integrity but not privacy.
A)AH
B)ESP
C)SPE
D)None of the choices are correct
10
The _______ protocol provides message authentication, integrity, and privacy.
A)AH
B)ESP
C)SPE
D)None of the choices are correct
11
The _______ was designed to provide security at the transport layer.
A)AH
B)ESP
C)TLS
D)None of the choices are correct
12
The _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
A)AH
B)ESP
C)TLS
D)None of the choices are correct
13
A packet-filter firewall filters at the ________ or ___________ layer.
A)network; application
B)transport; application
C)network; transport
D)None of the choices are correct
14
A proxy firewall filters at the __________ layer.
A)transport
B)network
C)application
D)None of the choices are correct
15
IPSec in the transport mode protects __________.
A)the IP header
B)the payload from the transport layer
C)both the IP header and the payload from the transport layer
D)None of the choices are correct
16
IPSec in the tunnel mode protects __________.
A)the IP header
B)the payload from the transport layer
C)both the IP header and the payload from the transport layer
D)None of the choices are correct
17
The ESP protocol was designed __________.
A)after the AH protocol
B)before the AH protocol
C)at the same time as AH protocol
D)None of the choices are correct
18
Access control in IPSec is provided using __________.
A)message integrity
B)security association database
C)replay attack
D)None of the choices are correct
19
IKE provides __________.
A)inbound SA
B)outbound SA
C)both inbound and outbound SA
D)None of the choices are correct
20
IKE is made of __________ component(s).
A)one
B)two
C)three
D)None of the choices are correct
21
SSL uses __________ protocol(s).
A)one
B)two
C)three
D)four







Data Comm. and NetworkingOnline Learning Center

Home > Chapter 32 > Quizzes