CH32 Forouzan IPSec, SSL/TLS, PGP, Firewalls

Ace your homework & exams now with Quizwiz!

In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

public

IKE is a complex protocol based on ______ other protocols.

three

A _______ layer security protocol provides end-to-end security services for applications.

transport

IPSec in the ______ mode does not protect the IP header.

transport

In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

transport

The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

transport

In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

tunnel

______ is the protocol designed to create security associations, both inbound and outbound.

IKE

______ provides authentication at the IP level.

AH

IPSec defines two protocols: _______ and ________.

AH; ESP

______ provides either authentication or encryption, or both, for packets at the IP level.

ESP

A ______ provides privacy for LANs that must communicate through the global Internet.

VPN

IKE creates SAs for _____.

IPSec

_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

IPSec

_________ operates in the transport mode or the tunnel mode.

IPSec

In _____, there can be multiple paths from fully or partially trusted authorities.

PGP

In _______, the cryptographic algorithms and secrets are sent with the message.

PGP

One security protocol for the e-mail system is _________.

PGP

______ was invented by Phil Zimmerman.

PGP

_______ uses the idea of certificate trust levels.

PGP

________ provides privacy, integrity, and authentication in e-mail.

PGP

IPSec uses a set of SAs called the ________.

SADB

Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.

SSL & TLS

______ is designed to provide security and compression services to data generated from the application layer.

SSL & TLS

_______ provide security at the transport layer.

SSL & TLS

______ is actually an IETF version of _____

TLS; SSL

In ______, there is a single path from the fully trusted authority to any certificate.

X509

IKE uses _______.

all of the above (Oakley, SKEME, ISAKMP)

The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

cipher suite

An _________ is a network that allows authorized access from outside users.

extranet

An ________ is a private network that uses the Internet model.

intranet

SSL provides _________.

message integrity, confidentiality, compression

The Internet authorities have reserved addresses for _______.

none of the above(intranets, internets, extranets)

A _______network is used inside an organization.

private


Related study sets

Chapter 2- The California State Department of Real Estate

View Set

Gramm-Leach-Bliley Act (Privacy of Consumer Financial Information)

View Set