IPSec and TLS Flashcards

1
Q

IP spoofing is useful for ____________ communication

A

unidirectionalP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPsec can assure that ___________________

A

A router advertisement comes from an authorized routera routing update is not forgeda redirect message comes from the router to which the initial packet was sentP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encapsulated Security Payload (ESP) can be used inA) encryption only modeB) authentication only modeC) encryption and authentication mode

A

A, B, and CP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encapsulated Security Payload (ESP) can provide both confidentiality and integrity protection

A

trueP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If the authentication option of ESP is chosen, message integrity code is computed before encryption

A

falseP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To protect the confidentiality and integrity of the whole original IP packet, we can use ESP with the authentication option in tunnel mode

A

trueP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Authentication Header, the integrity hash covers the IP header

A

trueP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The security association, SA, specifies a two-way security arrangements between the sender and receiver

A

falseP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Parameter Index (SPI) is used to help receiver identify the Security Association (SA) to unprocess the IPSec packet

A

trueP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If the sequence number of the IPSec header is greater than the largest number of the current anti-reply window the packet is rejected

A

falseP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If the sequence number in the IPSec header is smaller than the smallest umber of the current anti-replay window the packet is rejected

A

trueP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Diffie-Hellman key exchange is restricted to two party communication only

A

falseP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IKE SA needs to be established before IPSec SAs can be negotiated

A

trueP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The identity of the responder and receiver and the messages they have exchanged need to be authenticated(authentication and key exchange)

A

trueP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With perfect forward secrecy, the IPSec SA keys are based on the IKE shared secret established in phase I.

A

falseP2 L10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Most browsers come equipped with SSL and most web servers have implemented the protocol

A

trueP2 L10

17
Q

Since TLS is for the transport later, it relies on IPSec, which is for the IP later

A

falseP2 L10

18
Q

In most applications of TLS or SSL, public keys are used for authentication and key exchange

A

trueP2 L10