Tute W6

Tute W6

University

15 Qs

quiz-placeholder

Similar activities

Quiz Pem Mobile

Quiz Pem Mobile

University

10 Qs

MT - Basic FTTH

MT - Basic FTTH

1st Grade - Professional Development

20 Qs

TPAV

TPAV

12th Grade - University

10 Qs

Topic 5: Stretching Techniques

Topic 5: Stretching Techniques

University

20 Qs

Spreadsheet

Spreadsheet

8th Grade - University

20 Qs

Web Development and Programming

Web Development and Programming

University

20 Qs

data structures1

data structures1

University

20 Qs

Quiz Pemrograman Perangkat Bergerak 2

Quiz Pemrograman Perangkat Bergerak 2

12th Grade - University

20 Qs

Tute W6

Tute W6

Assessment

Quiz

Computers, Science

University

Practice Problem

Hard

Created by

Sh K

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Authentication applied to the entire original IP packet is _________ .

security mode

cipher mode

tunnel mode

transport mode

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

_________ defines a number of techniques for key management.

KEP

KMP

SKE

IKE

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

. Authentication applied to all of the packet except for the IP header is _________ .

tunnel mode

transport mode

association mode

security mode

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

. The __________ mechanism assures that a received packet was in fact transmitted

by the party identified as the source in the packet header and assures that the

packet has not been altered in transit.

confidentiality

authentication

security

key management

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

__________ provides the capability to secure communications across a LAN, across

private and public WANs, and across the Internet.

IKE

ISA

IAB

IPsec

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The _________ facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties.

security

key management

authentication

confidentiality

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The key management mechanism that is used to distribute keys is coupled to the authentication and privacy mechanisms only by way of the _________ .

IAB

SPI

ESP

SPD

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?