Tute W6

Tute W6

University

15 Qs

quiz-placeholder

Similar activities

Pemahaman Sistem Operasi Komputer

Pemahaman Sistem Operasi Komputer

10th Grade - University

20 Qs

Quiz Pem Mobile

Quiz Pem Mobile

University

10 Qs

APi Security webinar

APi Security webinar

University

10 Qs

Computer Quiz

Computer Quiz

University

18 Qs

IoT Unit 4

IoT Unit 4

University - Professional Development

10 Qs

CIPHER QUEST ROUND 2 SET 1

CIPHER QUEST ROUND 2 SET 1

University

20 Qs

AAA Security and Access Management Quiz

AAA Security and Access Management Quiz

11th Grade - University

15 Qs

UTS SI. Kemanan Sistem Informasi

UTS SI. Kemanan Sistem Informasi

University

10 Qs

Tute W6

Tute W6

Assessment

Quiz

Computers, Science

University

Hard

Created by

Sh K

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Authentication applied to the entire original IP packet is _________ .

security mode

cipher mode

tunnel mode

transport mode

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ defines a number of techniques for key management.

KEP

KMP

SKE

IKE

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

. Authentication applied to all of the packet except for the IP header is _________ .

tunnel mode

transport mode

association mode

security mode

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

. The __________ mechanism assures that a received packet was in fact transmitted

by the party identified as the source in the packet header and assures that the

packet has not been altered in transit.

confidentiality

authentication

security

key management

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ provides the capability to secure communications across a LAN, across

private and public WANs, and across the Internet.

IKE

ISA

IAB

IPsec

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.

security

key management

authentication

confidentiality

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .

IAB

SPI

ESP

SPD

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?