Computer
Networks Questions and Answers for Experienced people focuses on AH and ESP
Protocols
1. Which mode of IPsec should you
use to assure security and confidentiality of data within the same LAN?
a) AH transport mode
b) ESP transport mode
c) ESP tunnel mode
d) AH tunnel mode
a) AH transport mode
b) ESP transport mode
c) ESP tunnel mode
d) AH tunnel mode
Answer: b
Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN.
Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN.
2. Which two types of encryption
protocols can be used to secure the authentication of computers using IPsec?
a) Kerberos V5
b) SHA
c) MD5
d) Both SHA and MD5
a) Kerberos V5
b) SHA
c) MD5
d) Both SHA and MD5
Answer: d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.
3. Which two types of IPsec can be
used to secure communications between two LANs?
a) AH tunnel mode
b) ESP tunnel mode
c) Both AH tunnel mode and ESP tunnel mode
d) ESP transport mode
a) AH tunnel mode
b) ESP tunnel mode
c) Both AH tunnel mode and ESP tunnel mode
d) ESP transport mode
Answer: c
Explanation: A tunnel mode IPsec should be used. Option c is for data transfer purpose, option d is for integrity & confidentiality purpose.
Explanation: A tunnel mode IPsec should be used. Option c is for data transfer purpose, option d is for integrity & confidentiality purpose.
4. ______ provides authentication at
the IP level.
a) AH
b) ESP
c) PGP
d) SSL
a) AH
b) ESP
c) PGP
d) SSL
Answer: a
Explanation: It provides integrity checking and anti-reply security.
Explanation: It provides integrity checking and anti-reply security.
5. IPsec defines two protocols:
_______ and ________
a) AH; SSL
b) PGP; ESP
c) AH; ESP
d) All of the mentioned
a) AH; SSL
b) PGP; ESP
c) AH; ESP
d) All of the mentioned
Answer: c
Explanation: Authentication header and Encryption security payload.
Explanation: Authentication header and Encryption security payload.
6. IP Security operates in which
layer of the OSI model?
a) Network
b) Transport
c) Application
d) Physical
a) Network
b) Transport
c) Application
d) Physical
Answer: a
Explanation: Network layer is mainly used for security purpose, so IPsec in mainly operates in network layer.
Explanation: Network layer is mainly used for security purpose, so IPsec in mainly operates in network layer.
7. ESP provides
a) source authentication
b) data integrity
c) privacy
d) all of the mentioned
a) source authentication
b) data integrity
c) privacy
d) all of the mentioned
Answer: d
Explanation: Encrypted security payload provides source, data integrity and privacy.
Explanation: Encrypted security payload provides source, data integrity and privacy.
8. In computer security… means that
computer system assets can be modified only by authorized parities.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
Answer: b
Explanation: Integrity means that computer system assets can be modified only by authorized parities.
Explanation: Integrity means that computer system assets can be modified only by authorized parities.
9. In computer security… means that
the information in a computer system only be accessible for reading by
authorized parities.
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
a) Confidentiality
b) Integrity
c) Availability
d) Authenticity
Answer: a
Explanation: Confidentiality means that the information in a computer system only be accessible for reading by authorized parities.
Explanation: Confidentiality means that the information in a computer system only be accessible for reading by authorized parities.
10. Which of the following
organizations is primarily concerned with military encryption systems?
a) NSA
b) NIST
c) IEEE
d) ITU
a) NSA
b) NIST
c) IEEE
d) ITU
Answer: a
Explanation: The NSA is primarily responsible for military encryption systems. The NSA designs, evaluates, and implements encryption systems for the military and government agencies with high security needs.
تابع أسئلة الشبكات Explanation: The NSA is primarily responsible for military encryption systems. The NSA designs, evaluates, and implements encryption systems for the military and government agencies with high security needs.
ليست هناك تعليقات:
إرسال تعليق