Module G7: Network Tunneling (PE) Flashcards
What is a protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol Network?
IPsec
CPsec
IPv4Sec
None of the above
IPsec
IPsec was originally developed to cover for IPv4 coming out, enhancing their end to end security via securing applications at which layer in the OSI model?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 3
What does IPsec allow for the capability to do?
Establish a mutual authentication between agents at the beginning of a session
Negotiation of cryptographic keys to use during the session
Protect data flows between a pair of hosts, a pair of networks, or between a gateway and a host
Use cryptographic security services to protect communications over IP networks
All of the Above.
All of the Above
Which main protocol provides trusted identification and proof that data was not changed, but does not provide encryption or privacy?
Authentication header
Which main protocol provides source integrity through source authentication, data integrity through hash functions, and confidentiality through encryption protection for IP packets?
ESP
Encapsulated Security Payload
Which main protocol is used to negotiate the connection using configurations and preferences at each end of the connection to establish the security protocols to be used?
Internet Key Exchange
Which version of IKE uses Diffie-Hellman public key exchange over the course of 3 or 6 messages?
IKEv1
Which version of IKE uses four messages, with built-in NAT functionality and supports Asymmetric authentication?
IKEv2
Generic Routing Encapsulation (GRE) is a tunneling protcol developed by who?
Cisco
When encapsulation, GRE uses a process ID (PID) of ___ in the added header?
47
GRE can encapsulate a wide variety of network layer protocols inside either virtual _________ links or Point-to-Multipoint links over the IP Network?
Point-to-Point
What provides a secure channel over an unsecured network by using a client–server architecture?
ssh
SSH is typically used in _____ systems, but can be used on Windows as well.
UNIX-like
This type of SSH authentication, known as ____ generated, is where users/programs are allowed to log in without needing to specify a password.
manually
This type of SSH authentication, known as ____ generated, is where each user will use a password to log on.
automatically