Fundamentals of IP Security Flashcards

1
Q

Which technology is a primary method that IPSec uses to implement integrity?

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the source and destination addresses used for an encrypted IPSec packet?

A

Sending and Receiving VPN gateway’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which phase is used for private management traffic between the two VPN peers?

A

IKE Phase 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name four things that are negotiated during IKE Phase 1?

A

Hashing, DH group, Encryption, Authentication method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What method is used to allow two VPN peers to establish shared secret keys and to establish those kays over an untrusted network?

A

Diffie-Hellman (DH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name three parts of the IKE Phase 1 process?

A

Negotiation of the IKE Phase 1 protocols, Running DH, Authenticating the peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is the negotiation of the IPSec (IKE Phase 2) tunnel done securely?

A

Uses the IKE Phase 1 tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two main methods for authenticating a peer as the last step of IKE Phase 1?

A

RSA signatures, using digital certificates to exchange public keys, PSK (Pre-shared key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which component acts as an if-then statement, looking for packets that should be encrypted before they leave the interface?

A

crypto map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is true about symmetrical algorithms and symmetrical crypto access lists used on VPN peers?

A

Symmetrical algorithms use the same secret (key) to lock and unlock the data. Symmetrical ACLs between two VPN peers should symmetrically swap the source and destination portions of the ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which command reveals the ACL, transform sets, and peer information and indicate which interface is being used to connect to the remote IPSec VPN peer?

A

show crypto map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly