Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Which of the following statements are true about Private IPv4 addresses? (Select all that apply.) a. IANA doesnt manage the assignment of private IPv4

1. Which of the following statements are true about Private IPv4 addresses? (Select all that apply.)

a.

IANA doesnt manage the assignment of private IPv4 networks to organizations.

b.

Network Address Translation creates a temporary mapping of public IPv4 addresses to private IP addresses as they are requested.

c.

Properly configured NAT is required to access the Internet from a computer assigned the IPv4 address 172.32.17.17

d.

The use of classless IPv4 routing, Private IP usage inside organizations, and NAT have slowed the need to migrate to IPv6.

2.

Which of the following statements are true regarding the IPsec ESP security transform? (Select all that apply.)

a.

In tunnel mode, ESP protects the inner IP header and payload.

b.

In tunnel mode, ESP can provide Data Integrity, Data-Origin Authentication, and Confidentiality.

c.

In tunnel mode, ESP protects all the fields of the outer IP header, the ESP header, the inner IP header, and the payload.

d.

ESP Tunnel mode is most often used between IPsec gateways and not the end points of the communication.

3.

Which of the following describe Secure Shell?

a.

Is not compatible with Secure File Transfer Protocol.

b.

Uses the DSA symmetric encryption algorithm to encrypt traffic between endpoints.

c.

Initial authentication is in plain-text.

d.

Can be used to remotely manage devices on remote networks.

4.

Which of the following statements are true regarding IPsec Security Associations? (Select all that apply.)

a.

Security Association attributes are negotiated between IPsec endpoints as part of the first phase of Internet Key Exchange.

b.

Two endpoints can communicate bidirectionally once they establish a Security Association.

c.

The SPI value in the ESP Header tells the receiving endpoint which SA should be used to process the received packet.

d.

The Security Parameter Index acts as a temporary key used to encrypt user traffic streams.

5.

Which of the following statements are true regarding Mobile IP? (Select all that apply.)

a.

MIP has no organic security mechanisms built into it.

b.

Mobility Agents track which network the Mobile user is using and create encrypted tunnels between appropriate agents to pass the Mobile Users traffic to and from the communicating node.

c.

Mobile IP enables devices to move between networks without interrupting application sessions.

d.

Mobile Agents use MIP signaling messages to exchange information about location of each mobile user.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Put Your Data To Work 52 Tips And Techniques For Effectively Managing Your Database

Authors: Wes Trochlil

1st Edition

0880343079, 978-0880343077

More Books

Students also viewed these Databases questions

Question

Explain the function and purpose of the Job Level Table.

Answered: 1 week ago