Which mode of IPsec should you use to assure security and confidentiality of data within the same LAN?
Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN.
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
Answer: c, d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.
Which two types of IPsec can be used to secure communications between two LANs?
Answer: a, b
Explanation: A tunnel mode IPsec should be used. Option c is for data transfer purpose, option d is for integrity & confidentiality purpose.
______ provides authentication at the IP level.
Explanation: It provides integrity checking and anti-reply security.
IPsec defines two protocols: _______ and ________
Explanation: Authentication header and Encryption security payload.
IP Security operates in which layer of the OSI model?
Explanation: Network layer is mainly used for security purpose, so IPsec in mainly operates in network layer.
Explanation: Encrypted security payload provides source, data integrity and privacy.
In computer security… means that computer system assets can be modified only by authorized parities.
Explanation: Integrity means that computer system assets can be modified only by authorized parities.
In computer security… means that the information in a computer system only be accessible for reading by authorized parities.
Explanation: Confidentiality means that the information in a computer system only be accessible for reading by authorized parities.
Which of the following organizations is primarily concerned with military encryption systems?
Explanation: The NSA is primarily responsible for military encryption systems. The NSA designs, evaluates, and implements encryption systems for the military and government agencies with high security needs.