CH32 Forouzan IPSec, SSL/TLS, PGP, Firewalls

Ace your homework & exams now with Quizwiz!

In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.

public

IKE is a complex protocol based on ______ other protocols.

three

A _______ layer security protocol provides end-to-end security services for applications.

transport

IPSec in the ______ mode does not protect the IP header.

transport

In the ______ mode, IPSec protects information delivered from the transport layer to the network layer.

transport

The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

transport

In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

tunnel

______ is the protocol designed to create security associations, both inbound and outbound.

IKE

______ provides authentication at the IP level.

AH

IPSec defines two protocols: _______ and ________.

AH; ESP

______ provides either authentication or encryption, or both, for packets at the IP level.

ESP

A ______ provides privacy for LANs that must communicate through the global Internet.

VPN

IKE creates SAs for _____.

IPSec

_________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level.

IPSec

_________ operates in the transport mode or the tunnel mode.

IPSec

In _____, there can be multiple paths from fully or partially trusted authorities.

PGP

In _______, the cryptographic algorithms and secrets are sent with the message.

PGP

One security protocol for the e-mail system is _________.

PGP

______ was invented by Phil Zimmerman.

PGP

_______ uses the idea of certificate trust levels.

PGP

________ provides privacy, integrity, and authentication in e-mail.

PGP

IPSec uses a set of SAs called the ________.

SADB

Typically, ______ can receive application data from any application layer protocol, but the protocol is normally HTTP.

SSL & TLS

______ is designed to provide security and compression services to data generated from the application layer.

SSL & TLS

_______ provide security at the transport layer.

SSL & TLS

______ is actually an IETF version of _____

TLS; SSL

In ______, there is a single path from the fully trusted authority to any certificate.

X509

IKE uses _______.

all of the above (Oakley, SKEME, ISAKMP)

The combination of key exchange, hash, and encryption algorithms defines a ________ for each SSL session.

cipher suite

An _________ is a network that allows authorized access from outside users.

extranet

An ________ is a private network that uses the Internet model.

intranet

SSL provides _________.

message integrity, confidentiality, compression

The Internet authorities have reserved addresses for _______.

none of the above(intranets, internets, extranets)

A _______network is used inside an organization.

private


Related study sets

Chapter 2- The California State Department of Real Estate

View Set

Gramm-Leach-Bliley Act (Privacy of Consumer Financial Information)

View Set

AP Psych Module 12 ReviewSharon is continually tense, jittery, and apprehensive for no specific reason. She would probably be diagnosed as suffering a(n):

View Set