Page 792 - StudyBook.pdf
P. 792
776 Appendix • Self Test Appendix
A.SSH is concerned with protecting the confidentiality and integrity of the data being passed
between a client and a host.
Although the availability (B) of information is important, it is not specified as part of the SSH
protocol. SSH does not have an accounting function, and therefore does not have an account-
ability (C) feature. Speed (D) is always important when communicating between clients and
hosts, but it is not part of SSH by design.
9. IPSec is made up of two basic security protocols:The AH protocol and the
_________________ protocol.
A. SPA
B. IKE
C. ESP
D. EAP
C.The ESP protocol handles authentication, integrity, and confidentiality through the use of
encryption.
A security association (A) is an agreement between two parties on the types of keys, authenti-
cation, IP addresses, and other information that is unique to their IPSec connection.The IKE
(B) is part of IPSec, but it is responsible for key management and is not a security protocol in
itself.The EAP (D) is an authentication protocol commonly used with PPP.
10. You are a consultant working with a high-profile client.They are concerned about the possi-
bility of sensitive e-mail being read by unauthorized persons.After listening to their issues,
you recommend that they implement either S/MIME or PGP to _________ their messages.
Select the BEST answer.
A. Encapsulate
B. Encrypt
C. Authorize
D. Identify
B. S/MIME and PGP are both common methods of encrypting e-mail messages.
Traditionally, the term encapsulate (A) is used when referring to VPNs. Neither S/MIME or
PGP are tunneling protocols, nor do they encapsulate messages.Authorization ( C ) and identi-
fication (D) are both part of the encryption process, but the key here is the encryption of the
messages.
11. Most ISPs offer their customers a service to block _____.
A. Hoaxes
B. SMTP relay
C. Viruses
D. Spam
www.syngress.com