Generic Routing Encapsulation (GRE) is a secure VPN technology for use on unsecured Intranets or the Internet ?
Answer
True
False
Question 2
Question
The ____ _____ ____ is the only type of encryption that has been proven to be absolutely impossible to crack if used correctly.
Answer
one
time
pad
sole
Question 3
Question
Select the most secure of the following encryption standards ?
Answer
TDES
DES
AES
DDES
Question 4
Question
IKE is the protocol used to set up a ______ ________ in the IPsec protocol suite.
Answer
Association
Secure
safe
available
Question 5
Question
The goals of cryptography are ?
Answer
Non-repudiation
Efficiency
Integrity
Authentication
Confidentiality
None of these.
Question 6
Question
Stream ciphers are generally associated with:
Answer
Once off authentications
High speed
Are slow due to the nature of the stream merging with the pseudo-random bits
Hardware implementations
Question 7
Question
In probability theory the ________ _________ is that in some set of randomly chosen people some pair of them will have the same birthday.
Answer
birthday
paradox
algorithm
Random
Question 8
Question
_________ ____ ______________ is used alongside IPsec as a key management protocol incorporating the Oakley key exchange and Skeme key exchange inside the Internet Security Association and Key Management Protocol (ISAKMP) framework.
Answer
Internet
Key
Exchange
Important
Question 9
Question
With Cisco routers a GRE tunnel is not essential and traffic can be carried through untrusted networks using IPsec when tunnel mode is used ?
Answer
True
False
Question 10
Question
Auguste Kerckhoffs principle or law states that: “a cryptosystem should be secure even if everything about the system, except the key, is public knowledge”
Answer
True
False
Question 11
Question
A Virtual Private Network is either
Answer
A computer network in which some of the links between nodes are carried over devices that are configured with private IP addresses (192.168.x.x).
A computer network built in the home whose IP addresses consist entirely of private addresses (192.168.x.x) and accesses the Internet only by NAT.
A network between routers that is hidden from computers around them.
A computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network instead of by physical wires.
Question 12
Question
For IPsec Encryption Transport mode order the protocols within the packet.
Answer
1. Outer IP
3. ESP
4. IP
5. Data
2. AH
Question 13
Question
Check the algorithms that are considered hashing functions