Test: AH & ESP Protocols


10 Questions MCQ Test Computer Networks | Test: AH & ESP Protocols


Description
Attempt Test: AH & ESP Protocols | 10 questions in 10 minutes | Mock test for Computer Science Engineering (CSE) preparation | Free important questions MCQ to study Computer Networks for Computer Science Engineering (CSE) Exam | Download free PDF with solutions
QUESTION: 1

Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?

Solution:

Answer: b
Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN.

*Multiple options can be correct
QUESTION: 2

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

Solution:

Answer: c, d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.

*Multiple options can be correct
QUESTION: 3

Which two types of IPsec can be used to secure communications between two LANs?

Solution:

Answer: a, b
Explanation: A tunnel mode IPsec should be used. Option c is for data transfer purpose, option d is for integrity & confidentiality purpose.

QUESTION: 4

______ provides authentication at the IP level.

Solution:

Answer: a
Explanation: It provides integrity checking and anti-reply security.

QUESTION: 5

IPsec defines two protocols: _______ and ________

Solution:

Answer: c
Explanation: Authentication header and Encryption security payload.

QUESTION: 6

 IP Security operates in which layer of the OSI model?

Solution:

Answer: a
Explanation: Network layer is mainly used for security purpose, so IPsec in mainly operates in network layer.

QUESTION: 7

ESP provides

Solution:

Answer: d
Explanation: Encrypted security payload provides source, data integrity and privacy.

QUESTION: 8

In computer security… means that computer system assets can be modified only by authorized parities.

Solution:

Answer: b
Explanation: Integrity means that computer system assets can be modified only by authorized parities.

QUESTION: 9

 In computer security… means that the information in a computer system only be accessible for reading by authorized parities.

Solution:

Answer: a
Explanation: Confidentiality means that the information in a computer system only be accessible for reading by authorized parities.

QUESTION: 10

Which of the following organizations is primarily concerned with military encryption systems?

Solution:

Answer: a
Explanation: The NSA is primarily responsible for military encryption systems. The NSA designs, evaluates, and implements encryption systems for the military and government agencies with high security needs.

Use Code STAYHOME200 and get INR 200 additional OFF
Use Coupon Code