Chapter 20: Ip Security: Cryptography and Network Security: Principles and Practice, 6 Edition, by William Stallings
Chapter 20: Ip Security: Cryptography and Network Security: Principles and Practice, 6 Edition, by William Stallings
Stallings
TRUE OR FALSE
T F 10. IPSec can guarantee that all traffic designated by the network
administrator is authenticated but cannot guarantee that it is
encrypted.
T F 11. Any traffic from the local host to a remote host for purposes of an
IKE exchange bypasses the IPsec processing.
MULTIPLE CHOICE
A) KEP B) KMP
C) SKE D) IKE
3. Authentication applied to all of the packet except for the IP header is _________ .
4. The __________ mechanism assures that a received packet was in fact transmitted
by the party identified as the source in the packet header and assures that the
packet has not been altered in transit.
A) confidentiality B) authentication
A) IKE B) ISA
C) IAB D) IPsec
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
6. The _________ facility enables communicating nodes to encrypt messages to
prevent eavesdropping by third parties.
C) authentication D) confidentiality
7. The key management mechanism that is used to distribute keys is coupled to the
authentication and privacy mechanisms only by way of the _________ .
A) IAB B) SPI
C) ESP D) SPD
8. A _________ is a one way relationship between a sender and a receiver that affords
security services to the traffic carried on it.
A) SAD B) SPD
C) SA D) SPI
A) TRS B) SPD
C) SAD D) SPI
A) SPI B) ESP
C) ISA D) IPsec
11. _________ identifies the type of data contained in the payload data field by
identifying the first header in that payload.
C) Flag D) Message ID
13. IKE key determination employs __________ to ensure against replay attacks.
A) cookies B) groups
C) flags D) nonces
14. The __________ payload contains either error or status information associated
with this SA or this SA negotiation.
A) Encrypted B) Notify
C) Configuration D) Nonce
15. The _________ payload allows peers to identify packet flows for processing by
IPsec services.
A) Configuration B) Vendor ID
SHORT ANSWER
2. _________ mode is used when one or both ends of an SA are a security gateway,
such as a firewall or router that implements IPsec.
10. IPsec provides security services at the ________ layer by enabling a system to
select required security protocols, determine the algorithms to use for the
services and put in place any cryptographic keys required to provide the
requested services.
11. The selectors that determine a Security Policy Database are: Name, Local and
Remote Ports, Next Layer Protocol, Remote IP Address, and _________ .
12. The term _________ refers to a sequence of SAs through which traffic must be
processed to provide a desired set of IPsec services.
13. Generic in that it does not dictate specific formats, the _________ is a key exchange
protocol based on the Diffie-Hellman algorithm with added security.
14. Three different authentication methods can be used with IKE key determination:
Public key encryption, symmetric key encryption, and _________ .
15. At any point in an IKE exchange the sender may include a _________ payload to
request the certificate of the other communicating entity.