Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/12

Click to flip

12 Cards in this Set

  • Front
  • Back
The primary goal of IPSec is to provide _ for _ _.
protection
IP packets
IPSEC is based on an _-_-_ security model
end-to-end
In an end-to-end security model, the _ and the _ are the only hosts that must know about the _ _
sender
receiver
IPSec protection
Computers that only route data from source to destination are _ _ _ _ IPSEC.
not required to support IPSec.
IPSec enhances network data security by:

1) Mutually _ _ prior to data exchange.
2) Establishing a security _ _ between the two computers.
3) _ exchanged data.
authenticating computers
association
Encrypting
IPSec uses _ _ packet formats when authenticating or encrypting data.
standard IP
Intermediary network devices, such as routers, do not have to handle _ packets _ from _ IP packets.
IPSec
differently
standard
In Windows, IPSec is implemented by using an _ _.
IPSec policy
Policies are _ _, or _, that define the level of _ that you want,
security settings, or rules
security
The IPSec _ matches every incoming and outgoing _ against the security settings defined in the active _ _
driver
packet
IPSec policy
You can apply IPSec policies to local computers, domain members, domains, or to multiple computers by using a _ _ object in the Active Directory™ directory service.
Group Policy
What IPSec features can prevent network security breaches that are caused by network monitoring and address spoofing?
Protocols and services for encryption.