A. Connectionless
B. Offer reliable service
C. Offer unreliable service
D. Does not offer error reporting
Explanation: IP does not provide reliable delivery service for the data. It’s dependent upon the transport layer protocols like TCP to offer reliability.
A. Ah transport mode
B. Esp transport mode
C. Esp tunnel mode
D. Ah tunnel mode
Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN. ESP tunnel mode is comparatively more secure and should be used to assure the security of the data within different LANs.
A. Kerberos v5
B. Sha
C. Md5
D. Both sha and md5
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.
A. Ah tunnel mode
B. Esp tunnel mode
C. Both ah tunnel mode and esp tunnel mode
D. Esp transport mode
Explanation: The AH and ESP tunnel mode IPSec should be used for data transfer purpose, option d is for integrity & confidentiality purpose. Tunnel mode provides security for the entire original IP packet unlike transport mode which is not as secure as it only encrypts the data portion and not the whole packet.
A. Ah
B. Esp
C. Pgp
D. Ssl
Explanation: The Authentication Header (AH) authenticates the origin of data, and guarantees the integrity of the information that’s being sent using IPSec. It also provides anti-reply security.
A. Ah; SSL
B. Pgp; esp
C. Ah; esp
D. Pgp; SSL
Explanation: AH ensures that there is no retransmission of data from an unauthorized source, and protects against data tampering. ESP provides with content protection and ensures that there is integrity and confidentiality for the message.
A. Network
B. Transport
C. Application
D. Physical
Explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer.
A. Source authentication
B. Data integrity
C. Privacy
D. Error control
Explanation: The ESP provides data confidentiality, integrity and authentication. It provides confidentiality through encryption. ESP can operate in two modes, transport mode and tunnel mode.
A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Explanation: Integrity means that computer system assets can be modified only by authorized parities. Confidentiality means that the assets can only be accessed by authorized parties. Availability refers to the accessibility of the resource to the authorized parties. Authenticity means that the asset is not unethically changed.
A. Confidentiality
B. Integrity
C. Availability
D. Authenticity
Explanation: Confidentiality means that the assets can only be accessed by authorized parties. Integrity means that computer system assets can be modified only by authorized parities. Availability refers to the accessibility of the resource to the authorized parties. Authenticity means that the asset is not unethically changed.