|
1 | | _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level. |
|
| | A) | IPSec |
| | B) | SSL |
| | C) | PGP |
| | D) | none of the above |
|
2 | | _________ operates in the transport mode or the tunnel mode. |
|
| | A) | IPSec |
| | B) | SSL |
| | C) | PGP |
| | D) | none of the above |
|
3 | | In the ______ mode, IPSec protects information delivered from the transport layer to the network layer. |
|
| | A) | transport |
| | B) | tunnel |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
4 | | IPSec in the ______ mode does not protect the IP header. |
|
| | A) | transport |
| | B) | tunnel |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
5 | | The _______ mode is normally used when we need host-to-host (end-to-end) protection of data. |
|
| | A) | transport |
| | B) | tunnel |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
6 | | In the _______ mode, IPSec protects the whole IP packet, including the original IP header. |
|
| | A) | transport |
| | B) | tunnel |
| | C) | either (a) or (b) |
| | D) | neither (a) nor (b) |
|
7 | | IPSec defines two protocols: _______ and ________. |
|
| | A) | AH; SSL |
| | B) | PGP; ESP |
| | C) | AH; ESP |
| | D) | none of the above |
|
8 | | ______ provides authentication at the IP level. |
|
| | A) | AH |
| | B) | ESP |
| | C) | PGP |
| | D) | SSL |
|
9 | | ______ provides either authentication or encryption, or both, for packets at the IP level. |
|
| | A) | AH |
| | B) | ESP |
| | C) | PGP |
| | D) | SSL |
|
10 | | IPSec uses a set of SAs called the ________. |
|
| | A) | SAD |
| | B) | SAB |
| | C) | SADB |
| | D) | none of the above |
|
11 | | ______ is the protocol designed to create security associations, both inbound and outbound. |
|
| | A) | SA |
| | B) | CA |
| | C) | KDC |
| | D) | IKE |
|
12 | | IKE creates SAs for _____. |
|
| | A) | SSL |
| | B) | PGP |
| | C) | IPSec |
| | D) | VP |
|
13 | | IKE is a complex protocol based on ______ other protocols. |
|
| | A) | two |
| | B) | three |
| | C) | four |
| | D) | five |
|
14 | | IKE uses _______. |
|
| | A) | Oakley |
| | B) | SKEME |
| | C) | ISAKMP |
| | D) | all of the above |
|
15 | | A _______network is used inside an organization. |
|
| | A) | private |
| | B) | public |
| | C) | semi-private |
| | D) | semi-public |
|
16 | | An ________ is a private network that uses the Internet model. |
|
| | A) | intranet |
| | B) | internet |
| | C) | extranet |
| | D) | none of the above |
|
17 | | An _________ is a network that allows authorized access from outside users. |
|
| | A) | intranet |
| | B) | internet |
| | C) | extranet |
| | D) | none of the above |
|
18 | | The Internet authorities have reserved addresses for _______. |
|
| | A) | intranets |
| | B) | internets |
| | C) | extranets |
| | D) | none of the above |
|
19 | | A ______ provides privacy for LANs that must communicate through the global Internet. |
|
| | A) | VPP |
| | B) | VNP |
| | C) | VNN |
| | D) | VPN |
|
20 | | A _______ layer security protocol provides end-to-end security services for applications. |
|
| | A) | data link |
| | B) | network |
| | C) | transport |
| | D) | none of the above |
|
21 | | ______ is actually an IETF version of _____ |
|
| | A) | TLS; TSS |
| | B) | SSL; TLS |
| | C) | TLS; SSL |
| | D) | SSL; SLT |
|
22 | | _______ provide security at the transport layer. |
|
| | A) | SSL |
| | B) | TLS |
| | C) | either (a) or (b) |
| | D) | both (a) and (b) |
|
23 | | ______ is designed to provide security and compression services to data generated from the application layer. |
|
| | A) | SSL |
| | B) | TLS |
| | C) | either (a) or (b) |
| | D) | both (a) and (b) |
|
24 | | Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP. |
|
| | A) | SSL |
| | B) | TLS |
| | C) | either (a) or (b) |
| | D) | both (a) and (b) |
|
25 | | SSL provides _________. |
|
| | A) | message integrity |
| | B) | confidentiality |
| | C) | compression |
| | D) | all of the above |
|
26 | | The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session. |
|
| | A) | list of protocols |
| | B) | cipher suite |
| | C) | list of keys |
| | D) | none of the above |
|
27 | | In _______, the cryptographic algorithms and secrets are sent with the message. |
|
| | A) | IPSec |
| | B) | SSL |
| | C) | TLS |
| | D) | PGP |
|
28 | | One security protocol for the e-mail system is _________. |
|
| | A) | IPSec |
| | B) | SSL |
| | C) | PGP |
| | D) | none of the above |
|
29 | | ______ was invented by Phil Zimmerman. |
|
| | A) | IPSec |
| | B) | SSL |
| | C) | PGP |
| | D) | none of the above |
|
30 | | ________ provides privacy, integrity, and authentication in e-mail. |
|
| | A) | IPSec |
| | B) | SSL |
| | C) | PGP |
| | D) | none of the above |
|
31 | | In PGP, to exchange e-mail messages, a user needs a ring of _______ keys. |
|
| | A) | secret |
| | B) | public |
| | C) | either (a) or (b) |
| | D) | both (a) and (b) |
|
32 | | In ______, there is a single path from the fully trusted authority to any certificate. |
|
| | A) | X509 |
| | B) | PGP |
| | C) | KDC |
| | D) | none of the above |
|
33 | | In _____, there can be multiple paths from fully or partially trusted authorities. |
|
| | A) | X509 |
| | B) | PGP |
| | C) | KDC |
| | D) | none of the above |
|
34 | | _______ uses the idea of certificate trust levels. |
|
| | A) | X509 |
| | B) | PGP |
| | C) | KDC |
| | D) | none of the above |