CH32 Forouzan IPSec, SSL/TLS, PGP, Firewalls
In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
public
IKE is a complex protocol based on ______ other protocols.
three
A _______ layer security protocol provides end-to-end security services for applications.
transport
IPSec in the ______ mode does not protect the IP header.
transport
In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.
transport
The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.
transport
In the _______ mode, IPSec protects the whole IP packet, including the original IP header.
tunnel
______ is the protocol designed to create security associations, both inbound and outbound.
IKE
______ provides authentication at the IP level.
AH
IPSec defines two protocols: _______ and ________.
AH; ESP
______ provides either authentication or encryption, or both, for packets at the IP level.
ESP
A ______ provides privacy for LANs that must communicate through the global Internet.
VPN
IKE creates SAs for _____.
IPSec
_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.
IPSec
_________ operates in the transport mode or the tunnel mode.
IPSec
In _____, there can be multiple paths from fully or partially trusted authorities.
PGP
In _______, the cryptographic algorithms and secrets are sent with the message.
PGP
One security protocol for the e-mail system is _________.
PGP
______ was invented by Phil Zimmerman.
PGP
_______ uses the idea of certificate trust levels.
PGP
________ provides privacy, integrity, and authentication in e-mail.
PGP
IPSec uses a set of SAs called the ________.
SADB
Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.
SSL & TLS
______ is designed to provide security and compression services to data generated from the application layer.
SSL & TLS
_______ provide security at the transport layer.
SSL & TLS
______ is actually an IETF version of _____
TLS; SSL
In ______, there is a single path from the fully trusted authority to any certificate.
X509
IKE uses _______.
all of the above (Oakley, SKEME, ISAKMP)
The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.
cipher suite
An _________ is a network that allows authorized access from outside users.
extranet
An ________ is a private network that uses the Internet model.
intranet
SSL provides _________.
message integrity, confidentiality, compression
The Internet authorities have reserved addresses for _______.
none of the above(intranets, internets, extranets)
A _______network is used inside an organization.
private