Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

Please answer all questions.

1

_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.
A)IPSec
B)SSL
C)PGP
D)none of the above
2

_________ operates in the transport mode or the tunnel mode.
A)IPSec
B)SSL
C)PGP
D)none of the above
3

In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.
A)transport
B)tunnel
C)either (a) or (b)
D)neither (a) nor (b)
4

IPSec in the ______ mode does not protect the IP header.
A)transport
B)tunnel
C)either (a) or (b)
D)neither (a) nor (b)
5

The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.
A)transport
B)tunnel
C)either (a) or (b)
D)neither (a) nor (b)
6

In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
A)transport
B)tunnel
C)either (a) or (b)
D)neither (a) nor (b)
7

IPSec defines two protocols: _______ and ________.
A)AH; SSL
B)PGP; ESP
C)AH; ESP
D)none of the above
8

______ provides authentication at the IP level.
A)AH
B)ESP
C)PGP
D)SSL
9

______ provides either authentication or encryption, or both, for packets at the IP level.
A)AH
B)ESP
C)PGP
D)SSL
10

IPSec uses a set of SAs called the ________.
A)SAD
B)SAB
C)SADB
D)none of the above
11

______ is the protocol designed to create security associations, both inbound and outbound.
A)SA
B)CA
C)KDC
D)IKE
12

IKE creates SAs for _____.
A)SSL
B)PGP
C)IPSec
D)VP
13

IKE is a complex protocol based on ______ other protocols.
A)two
B)three
C)four
D)five
14

IKE uses _______.
A)Oakley
B)SKEME
C)ISAKMP
D)all of the above
15

A _______network is used inside an organization.
A)private
B)public
C)semi-private
D)semi-public
16

An ________ is a private network that uses the Internet model.
A)intranet
B)internet
C)extranet
D)none of the above
17

An _________ is a network that allows authorized access from outside users.
A)intranet
B)internet
C)extranet
D)none of the above
18

The Internet authorities have reserved addresses for _______.
A)intranets
B)internets
C)extranets
D)none of the above
19

A ______ provides privacy for LANs that must communicate through the global Internet.
A)VPP
B)VNP
C)VNN
D)VPN
20

A _______ layer security protocol provides end-to-end security services for applications.
A)data link
B)network
C)transport
D)none of the above
21

______ is actually an IETF version of _____
A)TLS; TSS
B)SSL; TLS
C)TLS; SSL
D)SSL; SLT
22

_______ provide security at the transport layer.
A)SSL
B)TLS
C)either (a) or (b)
D)both (a) and (b)
23

______ is designed to provide security and compression services to data generated from the application layer.
A)SSL
B)TLS
C)either (a) or (b)
D)both (a) and (b)
24

Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.
A)SSL
B)TLS
C)either (a) or (b)
D)both (a) and (b)
25

SSL provides _________.
A)message integrity
B)confidentiality
C)compression
D)all of the above
26

The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
A)list of protocols
B)cipher suite
C)list of keys
D)none of the above
27

In _______, the cryptographic algorithms and secrets are sent with the message.
A)IPSec
B)SSL
C)TLS
D)PGP
28

One security protocol for the e-mail system is _________.
A)IPSec
B)SSL
C)PGP
D)none of the above
29

______ was invented by Phil Zimmerman.
A)IPSec
B)SSL
C)PGP
D)none of the above
30

________ provides privacy, integrity, and authentication in e-mail.
A)IPSec
B)SSL
C)PGP
D)none of the above
31

In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
A)secret
B)public
C)either (a) or (b)
D)both (a) and (b)
32

In ______, there is a single path from the fully trusted authority to any certificate.
A)X509
B)PGP
C)KDC
D)none of the above
33

In _____, there can be multiple paths from fully or partially trusted authorities.
A)X509
B)PGP
C)KDC
D)none of the above
34

_______ uses the idea of certificate trust levels.
A)X509
B)PGP
C)KDC
D)none of the above







forouzan4Online Learning Center

Home > Chapter 32 > Multiple Choice Quiz