ESAT Forouzan - Chapter 31: Virtual Private Network Flashcards

1
Q

IPSec requires a logical connection between two hosts using a signaling protocol called _____.
a. AH
b. SA
c. PGP
d. TLS

A

b. SA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The handshake protocol and data exchange protocol are part of _____.
a. CA
b. KDC
c. TLS
d. SSH

A

c. TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is a collection of protocols that provide security at the IP layer level.
a. TLS
b. SSH
c. PGP
d. IPSec

A

d. IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ is an IP layer security protocol that only provides integrity and authentication.
a. AH
b. PGP
c. ESP
d. IPSec

A

a. AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is an IP layer security protocol that provides privacy as well as integrity and authentication.
a. AH
b. PGP
c. ESP
d. IPSec

A

c. ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An IP datagram carries an authentication header if the _____ field of the IP header has a value of 51.
a. Next-header
b. Protocol
c. Security parameter index
d. Sequence number

A

b. Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A _____ can forward or block packets based on the information in the network layer and the transport layer headers.
a. Proxy firewall
b. Packet-filter firewall
c. Message digest
d. Private key

A

b. Packet-filter firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The _____ field in the authentication header and the ESP header defines the security method used in creating the authentication data.
a. Padding
b. Sequence number
c. Authentication data
d. SPI

A

d. SPI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is a transport layer security protocol.
a. TLS
b. PGP
c. IPSec
d. AH

A

a. TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A method to provide for the security transport of email is called _____.
a. TLS
b. SA
c. PGP
d. IPSec

A

c. PGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____ can forward or block messages based on the information in the message itself.
a. Proxy firewall
b. Packet filter firewall
c. Message digest
d. Private key

A

a. Proxy firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____ network is totally isolated from the global Internet.
a. Private
b. Hybrid
c. Virtual private
d. Any of the above

A

a. Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A _____ network can use a leased line for intraorganization communication and the Internet for interorganization communication.
a. Private
b. Hybrid
c. Virtual private
d. Any of the above

A

b. Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A VPN uses _____ to guarantee privacy.
a. IPSec
b. Tunneling
c. Both a and b
d. None of the above

A

c. Both a and b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a VPN, _____ encrypted.
a. The inner datagram is
b. The outer datagram is
c. Both inner and outer diagram are
d. Neither the inner nor the outer datagram is

A

c. Both inner and outer diagram are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tunneling is a technique in which the IP diagram is first _____ and then _____.
a. Encapsulated in another datagram; encrypted
b. Encrypted; encapsulated in another datagram
c. Authenticated; encrypted
d. Encrypted;authenticated

A

b. Encrypted; encapsulated in another datagram

17
Q

An _____ is a private network with no external access that uses the TCP/IO suite.
a. Internet
b. internet
c. Intranet
d. Extranet

A

c. Intranet

18
Q

An _____ is a private network with limited external access that uses the TCP/IP suite.
a. Internet
b. internet
c. Intranet
d. Extranet

A

d. Extranet