CH32 Forouzan 5th
Access control in IPSec is provided using __________.
security association database
IPSec in the tunnel mode protects __________.
the IP header
IPSec in the transport mode protects __________.
the payload from the transport layer
IKE is made of __________ component(s).
three
In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.
transport
IPSec operates at two different modes: _________ mode and _________mode.
transport; tunnel
In the ________ mode, the IPSec header is placed in front of the original IP header.
tunnel
The _______ protocol provides message authentication and integrity but not privacy.
AH
The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.
AH
The _______ protocol provides message authentication, integrity, and privacy.
ESP
VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
IPSec; tunneling
The _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.
NOT AH, ESP, TLS
IPSec defines two protocols: _________ and __________.
NOT AH/ SSP, ESP/ SSP, AH/ EH (AH;ESP?)
IPSec requires a logical connection between two hosts using a signaling protocol called ____________.
SA
The _______ was designed to provide security at the transport layer.
TLS
The ESP protocol was designed __________.
after the AH protocol
A proxy firewall filters at the __________ layer.
application
IKE provides __________.
both inbound and outbound SA
SSL uses __________ protocol(s).
four
IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.
network
A packet-filter firewall filters at the ________ or ___________ layer.
network; transport