Computer Networks » Experienced
Which of these is not applicable for IP protocol?

A. Connectionless
B. Offer reliable service
C. Offer unreliable service
D. Does not offer error reporting

Explanation: IP does not provide reliable delivery service for the data. It’s dependent upon the transport layer protocols like TCP to offer reliability.

Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?

A. Ah transport mode
B. Esp transport mode
C. Esp tunnel mode
D. Ah tunnel mode

Explanation: ESP transport mode should be used to ensure the integrity and confidentiality of data that is exchanged within the same LAN. ESP tunnel mode is comparatively more secure and should be used to assure the security of the data within different LANs.

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

A. Kerberos v5
B. Sha
C. Md5
D. Both sha and md5

Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.

Which two types of IPsec can be used to secure communications between two LANs?

A. Ah tunnel mode
B. Esp tunnel mode
C. Both ah tunnel mode and esp tunnel mode
D. Esp transport mode

Explanation: The AH and ESP tunnel mode IPSec should be used for data transfer purpose, option d is for integrity & confidentiality purpose. Tunnel mode provides security for the entire original IP packet unlike transport mode which is not as secure as it only encrypts the data portion and not the whole packet.

______ provides authentication at the IP level.

A. Ah
B. Esp
C. Pgp
D. Ssl

Explanation: The Authentication Header (AH) authenticates the origin of data, and guarantees the integrity of the information that’s being sent using IPSec. It also provides anti-reply security.

IPsec defines two protocols: _______ and ________

A. Ah; SSL
B. Pgp; esp
C. Ah; esp
D. Pgp; SSL

Explanation: AH ensures that there is no retransmission of data from an unauthorized source, and protects against data tampering. ESP provides with content protection and ensures that there is integrity and confidentiality for the message.

IP Security operates in which layer of the OSI model?

A. Network
B. Transport
C. Application
D. Physical

Explanation: IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer.

ESP does not provide ________

A. Source authentication
B. Data integrity
C. Privacy
D. Error control

Explanation: The ESP provides data confidentiality, integrity and authentication. It provides confidentiality through encryption. ESP can operate in two modes, transport mode and tunnel mode.

In computer security _______ means that computer system assets can be modified only by authorized parities.

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity

Explanation: Integrity means that computer system assets can be modified only by authorized parities. Confidentiality means that the assets can only be accessed by authorized parties. Availability refers to the accessibility of the resource to the authorized parties. Authenticity means that the asset is not unethically changed.

In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities.

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity

Explanation: Confidentiality means that the assets can only be accessed by authorized parties. Integrity means that computer system assets can be modified only by authorized parities. Availability refers to the accessibility of the resource to the authorized parties. Authenticity means that the asset is not unethically changed.