Del Sutton
Quiz by , created more than 1 year ago

Quiz on VPN, created by Del Sutton on 23/04/2015.

139
0
0
No tags specified
Del Sutton
Created by Del Sutton about 9 years ago
Close

VPN

Question 1 of 13

1

Generic Routing Encapsulation (GRE) is a secure VPN technology for use on unsecured Intranets or the Internet ?

Select one of the following:

  • True
  • False

Explanation

Question 2 of 13

1

The ____ _____ ____ is the only type of encryption that has been proven to be absolutely impossible to crack if used correctly.

Select one or more of the following:

  • one

  • time

  • pad

  • sole

Explanation

Question 3 of 13

1

Select the most secure of the following encryption standards ?

Select one of the following:

  • TDES

  • DES

  • AES

  • DDES

Explanation

Question 4 of 13

1

IKE is the protocol used to set up a ______ ________ in the IPsec protocol suite.

Select one or more of the following:

  • Association

  • Secure

  • safe

  • available

Explanation

Question 5 of 13

1

The goals of cryptography are ?

Select one or more of the following:

  • Non-repudiation

  • Efficiency

  • Integrity

  • Authentication

  • Confidentiality

  • None of these.

Explanation

Question 6 of 13

1

Stream ciphers are generally associated with:

Select one or more of the following:

  • Once off authentications

  • High speed

  • Are slow due to the nature of the stream merging with the pseudo-random bits

  • Hardware implementations

Explanation

Question 7 of 13

1

In probability theory the ________ _________ is that in some set of randomly chosen people some pair of them will have the same birthday.

Select one or more of the following:

  • birthday

  • paradox

  • algorithm

  • Random

Explanation

Question 8 of 13

1

_________ ____ ______________ is used alongside IPsec as a key management protocol incorporating the Oakley key exchange and Skeme key exchange inside the Internet Security Association and Key Management Protocol (ISAKMP) framework.

Select one or more of the following:

  • Internet

  • Key

  • Exchange

  • Important

Explanation

Question 9 of 13

1

With Cisco routers a GRE tunnel is not essential and traffic can be carried through untrusted networks using IPsec when tunnel mode is used ?

Select one of the following:

  • True
  • False

Explanation

Question 10 of 13

1

Auguste Kerckhoffs principle or law states that: “a cryptosystem should be secure even if everything about the system, except the key, is public knowledge”

Select one of the following:

  • True
  • False

Explanation

Question 11 of 13

1

A Virtual Private Network is either

Select one of the following:

  • A computer network in which some of the links between nodes are carried over devices that are configured with private IP addresses (192.168.x.x).

  • A computer network built in the home whose IP addresses consist entirely of private addresses (192.168.x.x) and accesses the Internet only by NAT.

  • A network between routers that is hidden from computers around them.

  • A computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network instead of by physical wires.

Explanation

Question 12 of 13

1

For IPsec Encryption Transport mode order the protocols within the packet.

Select one or more of the following:

  • 1. Outer IP

  • 3. ESP

  • 4. IP

  • 5. Data

  • 2. AH

Explanation

Question 13 of 13

1

Check the algorithms that are considered hashing functions

Select one or more of the following:

  • MD5

  • SHA-1

  • MD-56


  • SHA-256

Explanation