Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
1. IPSec is supported by which of the following task forces?
|
Internet Engineering
|
|
2. With IPSec authentication, how many endpoints in the communication process must be trusted?
|
both endpoints
|
|
3. Which type of encryption uses multiple keys?
|
asymmetric
|
|
4. Which type of encryption uses only a single key?
|
both A and B (symmetric and hash)
|
|
5. IPSec uses digital signatures on __ packet(s) of info.
|
each
|
|
6. Which of the following parameters is negotiated when setting up a security association?
|
transport or tunnel mode
|
|
7. Which IPSec mode does not encrypt packet data?
|
AH
|
|
8. Which IPSec mode is used between two routers?
|
tunnel
|
|
9. Which of the following best describes a security association?
|
the security terms negotiated between two hosts using IPSec
|
|
10. How many ways are there for Win Server 2003 to authenticate IPSec connections.
|
three
|
|
11. The second window of the IP Filter Wizard asks for the source IP address for the filter. This can be statically configured as which of the following?
|
all of the above (My IP address, specific DNS name, any IP address)
|
|
12. What is the main disadvantage to third party certificates?
|
cost
|
|
13. Which of the following services can be configured to use certificates?
|
all of the above (e-mail, EFS, smart cards)
|
|
14. Kerberos uses a security boundary called a(n) __.
|
realm
|
|
15. Which of the following is an IPSec policy installed by default on Win Server 2003?
|
Server (Request Security)
|
|
16. How much ICMP traffic is allowed by the default IPSec policies?
|
all
|
|
17. How many policies can be assigned at a time on a single machine running Win Server 2003?
|
one
|
|
18. A single server can be configured with how many IPSec policies?
|
as many as desired
|
|
19. After an IPSec policy is assigned, when does it take effect?
|
upon restarted the IPSec Policy Agent
|
|
20. How many filter actions (used for security rules) exist by default on Win Server 2003?
|
three
|
|
21. What defines what is done to traffic that matches an IP filter list?
|
filter actions
|
|
22. Each filter action requires how many security methods?
|
at least one
|
|
23. Which two algorithms are used for AH and ESP data integrity?
|
SHA1 and MD5
|
|
24. Which two algorithms are used for ESP data encryption?
|
DES and 3DES
|
|
25. Which of the following is the most common hashing algorithm for commercial apps?
|
MD5
|
|
26. In cryptography, what does a key refer to?
|
a large number that is difficult to guess
|
|
27. Which type of encryption uses a public and private key?
|
asymmetrical
|
|
28. What mode of IPSec communication is characterized by the communication between two hosts?
|
transport mode
|
|
29. Which of the following is the process used by two IPSec hosts to negotiate their security parameters?
|
IKE
|
|
30. A certificate follows which standard?
|
X.509
|
|
31. In AD, a domain is equivelant to which of the following in relation to Kerberos?
|
realm
|
|
32. The default IPSec policies are configured to use which of the following for authentication by default?
|
Kerberos
|
|
33. How many IPSec policies can be used without being assigned?
|
zero
|
|
34. MD5 stands for __.
|
Message Digest 5
|
|
35. 3DES performs how many rounds of encryption with how many keys?
|
three rounds three keys
|