ESAT Forouzan - Chapter 31: Virtual Private Network Flashcards
IPSec requires a logical connection between two hosts using a signaling protocol called _____.
a. AH
b. SA
c. PGP
d. TLS
b. SA
The handshake protocol and data exchange protocol are part of _____.
a. CA
b. KDC
c. TLS
d. SSH
c. TLS
_____ is a collection of protocols that provide security at the IP layer level.
a. TLS
b. SSH
c. PGP
d. IPSec
d. IPSec
_____ is an IP layer security protocol that only provides integrity and authentication.
a. AH
b. PGP
c. ESP
d. IPSec
a. AH
_____ is an IP layer security protocol that provides privacy as well as integrity and authentication.
a. AH
b. PGP
c. ESP
d. IPSec
c. ESP
An IP datagram carries an authentication header if the _____ field of the IP header has a value of 51.
a. Next-header
b. Protocol
c. Security parameter index
d. Sequence number
b. Protocol
A _____ can forward or block packets based on the information in the network layer and the transport layer headers.
a. Proxy firewall
b. Packet-filter firewall
c. Message digest
d. Private key
b. Packet-filter firewall
The _____ field in the authentication header and the ESP header defines the security method used in creating the authentication data.
a. Padding
b. Sequence number
c. Authentication data
d. SPI
d. SPI
_____ is a transport layer security protocol.
a. TLS
b. PGP
c. IPSec
d. AH
a. TLS
A method to provide for the security transport of email is called _____.
a. TLS
b. SA
c. PGP
d. IPSec
c. PGP
A _____ can forward or block messages based on the information in the message itself.
a. Proxy firewall
b. Packet filter firewall
c. Message digest
d. Private key
a. Proxy firewall
A _____ network is totally isolated from the global Internet.
a. Private
b. Hybrid
c. Virtual private
d. Any of the above
a. Private
A _____ network can use a leased line for intraorganization communication and the Internet for interorganization communication.
a. Private
b. Hybrid
c. Virtual private
d. Any of the above
b. Hybrid
A VPN uses _____ to guarantee privacy.
a. IPSec
b. Tunneling
c. Both a and b
d. None of the above
c. Both a and b
In a VPN, _____ encrypted.
a. The inner datagram is
b. The outer datagram is
c. Both inner and outer diagram are
d. Neither the inner nor the outer datagram is
c. Both inner and outer diagram are