Test: AH And ESP Protocols


10 Questions MCQ Test Computer Networks - Notes, Videos, MCQs & PPTs | Test: AH And ESP Protocols


Description
This mock test of Test: AH And ESP Protocols for Computer Science Engineering (CSE) helps you for every Computer Science Engineering (CSE) entrance exam. This contains 10 Multiple Choice Questions for Computer Science Engineering (CSE) Test: AH And ESP Protocols (mcq) to study with solutions a complete question bank. The solved questions answers in this Test: AH And ESP Protocols quiz give you a good mix of easy questions and tough questions. Computer Science Engineering (CSE) students definitely take this Test: AH And ESP Protocols exercise for a better result in the exam. You can find other Test: AH And ESP Protocols extra questions, long questions & short questions for Computer Science Engineering (CSE) on EduRev as well by searching above.
QUESTION: 1

Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?

Solution:

Answer: b
Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN.

*Multiple options can be correct
QUESTION: 2

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

Solution:

Answer: c, d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.

*Multiple options can be correct
QUESTION: 3

Which two types of IPsec can be used to secure communications between two LANs?

Solution:

Answer: a, b
Explanation: A tunnel mode IPsec should be used. Option c is for data transfer purpose, option d is for integrity & confidentiality purpose.

QUESTION: 4

______ provides authentication at the IP level.

Solution:

Answer: a
Explanation: It provides integrity checking and anti-reply security.

QUESTION: 5

IPsec defines two protocols: _______ and ________

Solution:

Answer: c
Explanation: Authentication header and Encryption security payload.

QUESTION: 6

 IP Security operates in which layer of the OSI model?

Solution:

Answer: a
Explanation: Network layer is mainly used for security purpose, so IPsec in mainly operates in network layer.

QUESTION: 7

ESP provides

Solution:

Answer: d
Explanation: Encrypted security payload provides source, data integrity and privacy.

QUESTION: 8

In computer security… means that computer system assets can be modified only by authorized parities.

Solution:

Answer: b
Explanation: Integrity means that computer system assets can be modified only by authorized parities.

QUESTION: 9

 In computer security… means that the information in a computer system only be accessible for reading by authorized parities.

Solution:

Answer: a
Explanation: Confidentiality means that the information in a computer system only be accessible for reading by authorized parities.

QUESTION: 10

Which of the following organizations is primarily concerned with military encryption systems?

Solution:

Answer: a
Explanation: The NSA is primarily responsible for military encryption systems. The NSA designs, evaluates, and implements encryption systems for the military and government agencies with high security needs.

Related tests