a. What are the two stages in IP sec protection? b. What standard is used in the

Question:

a. What are the two stages in IP sec protection?


b. What standard is used in the first stage?

18b.) The first stage of IP sec uses the _________ protocol.

a. SSL/TLS

b. AES

c. IKE

d. SHA


c. In which stage is the SA negotiated?

18c.) The SA is negotiated in the _________.

a. IKE phase

b. IP sec protection phase

c. AES phase

d. None of the above


d. In which stage is the SA used to provide protection?

18d.) SA protections are applied in the _________.

a. IKE phase

b. IP sec protection

c. AES

d. None of the above


e. Can SAs be different in the two directions?.

18e.) SAs in the two directions _________.

a. Are always the same

b. Are always different

c. Are sometimes different


f. Why is it important to have and enforce policies for what cryptographic methods and options may be used in an organization?

18f.) Options for major cryptographic methods are sometimes unacceptably weak and must be prohibited.

a. True

b. False

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: