Page 792 - StudyBook.pdf
P. 792

776    Appendix • Self Test Appendix


              A.SSH is concerned with protecting the confidentiality and integrity of the data being passed
                 between a client and a host.
              Although the availability (B) of information is important, it is not specified as part of the SSH
                 protocol. SSH does not have an accounting function, and therefore does not have an account-
                 ability (C) feature. Speed (D) is always important when communicating between clients and
                 hosts, but it is not part of SSH by design.

              9.  IPSec is made up of two basic security protocols:The AH protocol and the
                  _________________ protocol.
                  A. SPA
                  B. IKE
                  C. ESP
                  D. EAP
              C.The ESP protocol handles authentication, integrity, and confidentiality through the use of
                 encryption.
              A security association (A) is an agreement between two parties on the types of keys, authenti-
                 cation, IP addresses, and other information that is unique to their IPSec connection.The IKE
                 (B) is part of IPSec, but it is responsible for key management and is not a security protocol in
                 itself.The EAP (D) is an authentication protocol commonly used with PPP.

              10. You are a consultant working with a high-profile client.They are concerned about the possi-
                  bility of sensitive e-mail being read by unauthorized persons.After listening to their issues,
                  you recommend that they implement either S/MIME or PGP to _________ their messages.
                  Select the BEST answer.
                  A. Encapsulate
                  B. Encrypt
                  C. Authorize
                  D. Identify
              B. S/MIME and PGP are both common methods of encrypting e-mail messages.
              Traditionally, the term encapsulate (A) is used when referring to VPNs. Neither S/MIME or
                 PGP are tunneling protocols, nor do they encapsulate messages.Authorization ( C ) and identi-
                 fication (D) are both part of the encryption process, but the key here is the encryption of the
                 messages.

              11. Most ISPs offer their customers a service to block _____.
                  A. Hoaxes
                  B. SMTP relay
                  C. Viruses
                  D. Spam





          www.syngress.com
   787   788   789   790   791   792   793   794   795   796   797