CYB3R53C

Cybersecurity Starts Here: Explore, Learn, and Secure Your Operations

Quiz – Fundamentals of IP Security

 
QUIZ START

Results

Congrats you have pass the quiz!!!

You have failed the quiz try again!!!

#1. Which of the following commands reveal the ACLs, transform sets and peer information and indicate which interface is being use to connect the remote IPsec VPN peer? (CISCO)

#2. Which components acts as in if-then statement, looking for packets that should be encrypted before they leave the interface?

#3. What are the two main authentication methods for authenticating a peer as the last step of IKE Phase 1?

#4. Which phase is used for private management traffic between the two VPN peers?

#5. How is the negotiation of the IPsec (IKE Phase 2) tunnel done securely?

#6. Which of the following is NOT part of the IKE Phase 1 process?

#7. What method is used to allow two VPN peers to establish shared secret keys and to establish those keys over an untrusted network?

#8. Which of the following are negotiated during IKE Phase 1

#9. What are the source and destination addresses used for any encrypted IPsec packet?

#10. Which technology is a primary method that IPsec uses to implement data integrity?

Previous
Finish