ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 364 - ANS-C00 discussion

Report
Export

The IPsec protocol suite is made up of various components covering aspects such as confidentiality, encryption, and integrity. Select the correct statement below regarding the correct configuration options for ensure IPsec confidentiality:

A.
The following protocols may be used to configure IPsec confidentiality, DES, 3DES, MD5
Answers
A.
The following protocols may be used to configure IPsec confidentiality, DES, 3DES, MD5
B.
The following protocols may be used to configure IPsec confidentiality, DES, 3DES, AES
Answers
B.
The following protocols may be used to configure IPsec confidentiality, DES, 3DES, AES
C.
The following protocols may be used to configure IPsec confidentiality, PSK, RSA
Answers
C.
The following protocols may be used to configure IPsec confidentiality, PSK, RSA
D.
The following protocols may be used to configure IPsec confidentiality, PSK, MD5
Answers
D.
The following protocols may be used to configure IPsec confidentiality, PSK, MD5
E.
The following protocols may be used to configure IPsec confidentiality, PSK, RSA
Answers
E.
The following protocols may be used to configure IPsec confidentiality, PSK, RSA
Suggested answer: B

Explanation:

Explanation:

Answer A is incorrect - as MD5 is a hashing protocol (data integrity) Answer C is incorrect - as PSK is short for Pre-Shared Keys (key exchange) - and again MD5 is a hashing protocol (data integrity) Answer D is incorrect - as both MD5 and SHA are hashing protocols (data integrity) Answer E is incorrect - as both PSK and RSA are used for key exchanges This leaves Answer B is the only correct IPsec configuration covering confidentiality. DES, 3DES, and AES are all encryption protocols.

Reference: https://en.wikipedia.org/wiki/IPsec

asked 16/09/2024
Jozsef Stelly
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first