• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back
1. IPSec is supported by which of the following task forces?
Internet Engineering
2. With IPSec authentication, how many endpoints in the communication process must be trusted?
both endpoints
3. Which type of encryption uses multiple keys?
asymmetric
4. Which type of encryption uses only a single key?
both A and B (symmetric and hash)
5. IPSec uses digital signatures on __ packet(s) of info.
each
6. Which of the following parameters is negotiated when setting up a security association?
transport or tunnel mode
7. Which IPSec mode does not encrypt packet data?
AH
8. Which IPSec mode is used between two routers?
tunnel
9. Which of the following best describes a security association?
the security terms negotiated between two hosts using IPSec
10. How many ways are there for Win Server 2003 to authenticate IPSec connections.
three
11. The second window of the IP Filter Wizard asks for the source IP address for the filter. This can be statically configured as which of the following?
all of the above (My IP address, specific DNS name, any IP address)
12. What is the main disadvantage to third party certificates?
cost
13. Which of the following services can be configured to use certificates?
all of the above (e-mail, EFS, smart cards)
14. Kerberos uses a security boundary called a(n) __.
realm
15. Which of the following is an IPSec policy installed by default on Win Server 2003?
Server (Request Security)
16. How much ICMP traffic is allowed by the default IPSec policies?
all
17. How many policies can be assigned at a time on a single machine running Win Server 2003?
one
18. A single server can be configured with how many IPSec policies?
as many as desired
19. After an IPSec policy is assigned, when does it take effect?
upon restarted the IPSec Policy Agent
20. How many filter actions (used for security rules) exist by default on Win Server 2003?
three
21. What defines what is done to traffic that matches an IP filter list?
filter actions
22. Each filter action requires how many security methods?
at least one
23. Which two algorithms are used for AH and ESP data integrity?
SHA1 and MD5
24. Which two algorithms are used for ESP data encryption?
DES and 3DES
25. Which of the following is the most common hashing algorithm for commercial apps?
MD5
26. In cryptography, what does a key refer to?
a large number that is difficult to guess
27. Which type of encryption uses a public and private key?
asymmetrical
28. What mode of IPSec communication is characterized by the communication between two hosts?
transport mode
29. Which of the following is the process used by two IPSec hosts to negotiate their security parameters?
IKE
30. A certificate follows which standard?
X.509
31. In AD, a domain is equivelant to which of the following in relation to Kerberos?
realm
32. The default IPSec policies are configured to use which of the following for authentication by default?
Kerberos
33. How many IPSec policies can be used without being assigned?
zero
34. MD5 stands for __.
Message Digest 5
35. 3DES performs how many rounds of encryption with how many keys?
three rounds three keys