Cryptography: VPNs, Hash Algorithms & Authentication

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is a primary goal of cryptography?

  • To ensure confidentiality of data (correct)
  • To reduce the amount of data transmitted
  • To speed up network traffic
  • To simplify network configurations

Which of the following is a cryptographic service?

  • Network Addressing
  • Load Balancing
  • Authentication (correct)
  • Quality of Service

What does integrity ensure in cryptographic services?

  • Data is publicly available
  • Data is quickly accessible
  • Data is compressed for efficient storage
  • Data remains unaltered during transit or storage (correct)

What is the purpose of hashing?

<p>To ensure integrity (B)</p>
Signup and view all the answers

Which of the following is a peer authentication method?

<p>Using a shared key and ID (C)</p>
Signup and view all the answers

What is the role of a Certificate Authority (CA)?

<p>To verify digital identities (D)</p>
Signup and view all the answers

What is the primary purpose of key exchange in cryptography?

<p>To securely share encryption keys (A)</p>
Signup and view all the answers

What is a characteristic of symmetric encryption?

<p>Uses the same key for encryption and decryption (A)</p>
Signup and view all the answers

Which CIA service does encryption directly support?

<p>Confidentiality (D)</p>
Signup and view all the answers

Which hash algorithm has a longer key-length, providing more security?

<p>SHA (B)</p>
Signup and view all the answers

What is HMAC used for?

<p>Authenticity (C)</p>
Signup and view all the answers

What is a digital signature's main property?

<p>Authenticity (A)</p>
Signup and view all the answers

Why are digital certificates used?

<p>To prove the bond between a public key and its subject (D)</p>
Signup and view all the answers

What is the function of a Registration Authority?

<p>Forwards enrollment requests to a CA (D)</p>
Signup and view all the answers

What is the full name of AES?

<p>Advanced Encryption Standard (A)</p>
Signup and view all the answers

What does VPN stand for?

<p>Virtual Private Network (D)</p>
Signup and view all the answers

What best describes integrity?

<p>Confirming data is unaltered. (C)</p>
Signup and view all the answers

Which of the following is stronger?

<p>SHA-256 (A)</p>
Signup and view all the answers

In a Public Key Infrastructure (PKI), which element is responsible for issuing digital certificates?

<p>Certification Authority (A)</p>
Signup and view all the answers

What is the purpose of running the hash algorithm?

<p>Hashes are used to determine if data has been altered. (B)</p>
Signup and view all the answers

If Alice wants to send an encrypted message to Bob using asymmetric encryption so only Bob can read it, which key does Alice use to encrypt the message?

<p>Bob's public key (C)</p>
Signup and view all the answers

Which key is generally used to decrypt data from asymmetric encryption?

<p>Private Key (D)</p>
Signup and view all the answers

Which of the options best describes confidentiality?

<p>Preventing unauthorized disclosure of information (B)</p>
Signup and view all the answers

Which type of encryption uses the same key for encryption and decryption?

<p>Symmetric Encryption (A)</p>
Signup and view all the answers

Cryptography ensures confidentiality, integrity, and authentication.

<p>True (A)</p>
Signup and view all the answers

Encryption is the sole method for ensuring data integrity.

<p>False (B)</p>
Signup and view all the answers

Authentication verifies the sender's identity.

<p>True (A)</p>
Signup and view all the answers

Symmetric encryption uses two different keys for encryption and decryption.

<p>False (B)</p>
Signup and view all the answers

Asymmetric encryption is generally faster than symmetric encryption.

<p>False (B)</p>
Signup and view all the answers

Hashing is a one-way function; it is easy to revert the hash to get the original data.

<p>False (B)</p>
Signup and view all the answers

A digital certificate is signed by a Certificate Authority (CA).

<p>True (A)</p>
Signup and view all the answers

Integrity ensures that data has not been altered during transmission.

<p>True (A)</p>
Signup and view all the answers

Confidentiality means that only authorized parties can access the information.

<p>True (A)</p>
Signup and view all the answers

MD5 is considered more secure than SHA-256.

<p>False (B)</p>
Signup and view all the answers

HMAC uses a secret key in addition to a hashing algorithm.

<p>True (A)</p>
Signup and view all the answers

The Diffie-Hellman algorithm is used for encrypting messages directly.

<p>False (B)</p>
Signup and view all the answers

Digital signatures provide non-repudiation, meaning the sender cannot deny sending the message.

<p>True (A)</p>
Signup and view all the answers

VPNs primarily offer integrity but not confidentiality.

<p>False (B)</p>
Signup and view all the answers

Encryption always guarantees complete anonymity.

<p>False (B)</p>
Signup and view all the answers

A shorter key length in encryption always means stronger security.

<p>False (B)</p>
Signup and view all the answers

SSL VPN stands for Secure Socket Layer Virtual Private Network

<p>True (A)</p>
Signup and view all the answers

Integrity checks can detect accidental or malicious data modification.

<p>True (A)</p>
Signup and view all the answers

The main goal of integrity is to prevent unauthorized access to data.

<p>False (B)</p>
Signup and view all the answers

Data origin authentication provides assurance that the data source is as claimed.

<p>True (A)</p>
Signup and view all the answers

DES and 3DES are equally secure encryption algorithms.

<p>False (B)</p>
Signup and view all the answers

The primary purpose of a firewall is to ensure data integrity.

<p>False (B)</p>
Signup and view all the answers

Cryptography can be used to protect data at rest and in transit.

<p>True (A)</p>
Signup and view all the answers

A Certificate Authority is responsible for issuing digital certificates.

<p>True (A)</p>
Signup and view all the answers

The terms 'encryption' and 'cipher' refer to distinct concepts in cryptography.

<p>False (B)</p>
Signup and view all the answers

Which of the following is a potential benefit of using VPNs?

<p>Cost savings (B)</p>
Signup and view all the answers

What type of VPN allows individual users to connect to a private network from a remote location?

<p>Remote-access VPN (B)</p>
Signup and view all the answers

What is a key factor to consider when comparing security protocols?

<p>Key length (D)</p>
Signup and view all the answers

In IPsec, which protocol provides data confidentiality?

<p>ESP (B)</p>
Signup and view all the answers

Which of the following is used for key exchange in IPsec?

<p>IKE (D)</p>
Signup and view all the answers

What is the purpose of AH (Authentication Header) in IPsec?

<p>Authentication (D)</p>
Signup and view all the answers

Which mode of IPsec encrypts the entire IP packet?

<p>Tunnel mode (B)</p>
Signup and view all the answers

Which of the following is a typical component of a remote-access VPN setup?

<p>VPN client software (B)</p>
Signup and view all the answers

In a site-to-site VPN, do clients typically need to be aware a VPN is being used?

<p>No, never (D)</p>
Signup and view all the answers

What is the first phase of IKE negotiation focused on?

<p>Negotiating ISAKMP policy (C)</p>
Signup and view all the answers

What command is used to see the ISAKMP policy on the router?

<p><code>show crypto isakmp policy</code> (B)</p>
Signup and view all the answers

After a crypto map is configured, what must be done to activate it?

<p>Apply it to an interface (A)</p>
Signup and view all the answers

What type of information can be exchanged via an IPsec tunnel?

<p>Any information (A)</p>
Signup and view all the answers

What command lets you see information regarding IPsec?

<p><code>show crypto ipsec sa</code> (C)</p>
Signup and view all the answers

What does the acronym ESP stand for?

<p>Encapsulating Security Payload (B)</p>
Signup and view all the answers

Which Diffie-Hellman group is included in the default configuration?

<p>5 (A)</p>
Signup and view all the answers

What does the command crypto isakmp key do?

<p>Configures a pre-shared key (B)</p>
Signup and view all the answers

When defining interesting traffic, what does the word ACL stand for?

<p>Access Control List (C)</p>
Signup and view all the answers

Which of the following isn't an ESP protocol?

<p>ESP-MD5-HMAC (B)</p>
Signup and view all the answers

What command is used to enable a crypto map on the interface?

<p><code>interface serial 0/0/0</code> (D)</p>
Signup and view all the answers

What is the command to verify the interface is using the crypto map?

<p><code>show crypto map</code> (C)</p>
Signup and view all the answers

After the configurations have been made, what should you do test and verify the VPN?

<p>Ping host B from host A (D)</p>
Signup and view all the answers

What type of data is encrypted with ESP?

<p>Data payload (A)</p>
Signup and view all the answers

Is all data in plaintext with AH?

<p>True (B)</p>
Signup and view all the answers

A VPN provides cost savings.

<p>True (A)</p>
Signup and view all the answers

In a site-to-site VPN, the client is aware of the VPN connection.

<p>False (B)</p>
Signup and view all the answers

IPsec operates at the Data Link Layer.

<p>False (B)</p>
Signup and view all the answers

IPsec provides security services such as confidentiality and integrity.

<p>True (A)</p>
Signup and view all the answers

AH provides encryption.

<p>False (B)</p>
Signup and view all the answers

ESP provides confidentiality.

<p>True (A)</p>
Signup and view all the answers

AES is considered more secure than Double DES.

<p>True (A)</p>
Signup and view all the answers

The Diffie-Hellman algorithm is used for key exchange.

<p>True (A)</p>
Signup and view all the answers

IKE has one phase.

<p>False (B)</p>
Signup and view all the answers

A remote-access VPN connects entire networks.

<p>False (B)</p>
Signup and view all the answers

A VPN encrypts all traffic.

<p>True (A)</p>
Signup and view all the answers

Using a VPN always slows down your internet speed.

<p>False (B)</p>
Signup and view all the answers

VPN stands for Very Private Network.

<p>False (B)</p>
Signup and view all the answers

IPsec is a single protocol.

<p>False (B)</p>
Signup and view all the answers

IPsec can only operate in tunnel mode.

<p>False (B)</p>
Signup and view all the answers

A longer key length generally indicates stronger encryption.

<p>True (A)</p>
Signup and view all the answers

In IKE Phase 1, the peers negotiate the IPsec policy.

<p>False (B)</p>
Signup and view all the answers

A crypto map is applied to a physical interface.

<p>True (A)</p>
Signup and view all the answers

show crypto isakmp sa shows IPsec security associations.

<p>False (B)</p>
Signup and view all the answers

VPNs are only used by large corporations.

<p>False (B)</p>
Signup and view all the answers

Compatibility is not a benefit of VPNs.

<p>False (B)</p>
Signup and view all the answers

A VPN cannot provide scalability.

<p>False (B)</p>
Signup and view all the answers

AH and ESP protocols can be used together.

<p>False (B)</p>
Signup and view all the answers

DH14 provides a stronger key exchange method than DH1.

<p>True (A)</p>
Signup and view all the answers

Flashcards

Confidentiality

Ensuring only authorized parties can view the data. Achieved through encryption.

Integrity

Ensuring data is not altered in transit or storage. Achieved through hashing algorithms like MD5 and SHA.

Authentication

Verifying the sender's identity. Achieved through digital signatures and certificates.

Symmetric Encryption

Uses the same key for encryption and decryption.

Signup and view all the flashcards

Asymmetric Encryption

Uses a pair of keys: a public key for encryption and a private key for decryption.

Signup and view all the flashcards

Hash Algorithms

Mathematical functions that create a unique, fixed-size 'fingerprint' of data.

Signup and view all the flashcards

Keyed-Hash Message Authentication Code (HMAC)

A code used to verify both data integrity and authenticity.

Signup and view all the flashcards

Diffie-Hellman

Used to securely exchange cryptographic keys over a public network.

Signup and view all the flashcards

Digital Certificates

Electronic documents that verify the digital identity of an entity.

Signup and view all the flashcards

Certification Authority (CA)

Entity that issues digital certificates.

Signup and view all the flashcards

Registration Authority

A 'lite' version of PKI certificate authority.

Signup and view all the flashcards

Confidentiality

DES, 3DES, AES, and SEAL are all protocols of?

Signup and view all the flashcards

Integrity

MD5 and SHA are?

Signup and view all the flashcards

Cryptography

The art of writing or solving codes.

Signup and view all the flashcards

Integrity validation

Compares computed and received hashes to confirm data hasn't changed.

Signup and view all the flashcards

Cryptographic Hash Function

A mathematical function that converts a data of arbitrary size to a fixed size.

Signup and view all the flashcards

HMAC

A keyed hash function used to provide authenticity of a message.

Signup and view all the flashcards

Diffie-Hellman key exchange

A secure method for exchanging cryptographic keys over a public network.

Signup and view all the flashcards

Certificate authority (CA)

An entity that vouches for the authenticity of entities on the Internet.

Signup and view all the flashcards

Registration Authority (RA)

A streamlined version of a CA that handles certificate enrollment requests.

Signup and view all the flashcards

DES, 3DES, AES, SEAL

Algorithms commonly used for confidentiality.

Signup and view all the flashcards

MD5, SHA

Used to maintain /validate integrity.

Signup and view all the flashcards

Diffie-Hellman (DH)

Used when you want to exchange keys, that is normally done through a DH...

Signup and view all the flashcards

Alice encrypts, bob decrypts

Using Asymmetric keys to Encrypt a Hash using a Private Key

Signup and view all the flashcards

DES, 3DES, AES, SEAl

Symmetrical encryption algorithms.

Signup and view all the flashcards

PSK, RSA

Encryption algorithms

Signup and view all the flashcards

Virtual Private Network (VPN)

A network that provides secure connections for remote users or sites, using encryption.

Signup and view all the flashcards

VPN Cost Savings

Reduces infrastructure costs by using existing network infrastructure.

Signup and view all the flashcards

VPN Security

A VPN benefit that ensures data is protected from unauthorized access.

Signup and view all the flashcards

VPN Scalability

Easily adapt to increased network demands

Signup and view all the flashcards

VPN Compatibility

Works with various devices and operating systems.

Signup and view all the flashcards

Site-to-Site VPN

Connects entire networks, like branch offices, over the internet.

Signup and view all the flashcards

Remote-Access VPN

Enables individual users to connect securely to a private network from remote locations.

Signup and view all the flashcards

IPsec (Internet Protocol Security)

A framework of protocols providing secure communication over IP networks.

Signup and view all the flashcards

IPsec Integrity

Guarantees that the data has not been altered during transmission.

Signup and view all the flashcards

IPsec Authentication

Verifies the identity of the sender.

Signup and view all the flashcards

IKE (Internet Key Exchange)

Provides secure key exchange in IPsec.

Signup and view all the flashcards

AH (Authentication Header)

A protocol that provides authentication and integrity, but not confidentiality.

Signup and view all the flashcards

ESP (Encapsulating Security Payload)

A protocol that provides confidentiality, authentication, and integrity.

Signup and view all the flashcards

AH protocol

All data is in plaintext.

Signup and view all the flashcards

Tunnel Mode

Mode where the entire IP packet is encrypted and encapsulated within a new IP packet.

Signup and view all the flashcards

Transport Mode

Only the payload of the IP packet is encrypted.

Signup and view all the flashcards

Security Association (SA)

The set of security parameters used to establish a secure connection in IPsec.

Signup and view all the flashcards

Phase 1

Negotiate ISAKMP policy to create a tunnel.

Signup and view all the flashcards

Phase 2

Negotiate IPsec policy for sending secure traffic across the tunnel.

Signup and view all the flashcards

ACL (Access Control List)

A misconfiguration can lead to the VPN not functioning correctly.

Signup and view all the flashcards

Transform Set

A set of IPsec parameters, like encryption and authentication algorithms.

Signup and view all the flashcards

Crypto Map

Defines which traffic should be protected by IPsec.

Signup and view all the flashcards

What is IPsec?

A Layer 3 protocol suite that secures communication over IP networks by providing confidentiality, integrity, and authentication.

Signup and view all the flashcards

Internet Key Exchange (IKE)

Offers secure key exchange for IPsec, sets up secure communication channels.

Signup and view all the flashcards

Authentication Header (AH)

Provides integrity and authentication but does not encrypt data, leaving the payload exposed.

Signup and view all the flashcards

Encapsulating Security Payload (ESP)

Provides confidentiality, integrity, and authentication by encrypting the data payload.

Signup and view all the flashcards

IPSec Transport Mode

Only the payload is protected, useful in secure end-to-end communications.

Signup and view all the flashcards

IPSec Tunnel Mode

The entire IP packet is encrypted and encapsulated, providing a completely secure encrypted tunnel.

Signup and view all the flashcards

IKE Phase 1

An initial negotiation phase to establish a secure channel for further IPsec negotiations.

Signup and view all the flashcards

IKE Phase 2

Where IPsec policies get decided after a secure channel has been established.

Signup and view all the flashcards

Access Control Lists (ACLs) for VPNs

Used to filter traffic and control which packets are allowed to initiate an IPsec tunnel.

Signup and view all the flashcards

IPsec Transform Set

Groups IPsec security settings like encryption algorithms and authentication methods.

Signup and view all the flashcards

crypto isakmp key Command

Command used to define which peers are allowed to establish the ISAKMP SA.

Signup and view all the flashcards

Interesting Traffic

Traffic that triggers the IPsec VPN to initiate after a device initiates a connection.

Signup and view all the flashcards

Extended Ping

A command that allows for extended pings that define larger packets, timeout intervals, and source IP addresses, and allows the administrator to test for VPN connection stability.

Signup and view all the flashcards

Study Notes

  • VPNs extend over a POP (Point of Presense)

Confidentiality (Cont.)

  • Less Secure to Most Secure data encryption: DES, 3DES, AES, SEAL

Authentication

  • Local Authentication Key + ID via the Internet to Remote Authentication results in keys matching

Authentication (Cont.)

  • Local Authentication Key + ID Encrypted via Internet with Digital Signature matching Remote Authentication Decrypted signature

Authentication Header (AH)

Authentication Header (Cont.)

  • IP Header + Data + Authentication Key Create a Hash via the Internet to verify Authentication Header

Encapsulating Security Payload (ESP)

  • ESP Encrypts and Authenticats Data

Crypto Map

  • Syntax to Configure a Crypto Map involves: crypto map map-name seq-num [ ipsec-isakmp | ipsec-manual ]

Crypto Map Configuration

  • Crypto Map Configuration commands: default, description, dialer, exit, match, no, qos, reverse-route, set

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Cryptography Concepts Quiz
4 questions
Parte 23.
25 questions

Parte 23.

ThumbsUpObsidian8119 avatar
ThumbsUpObsidian8119
Cryptography and Network Security
40 questions
Cryptography Fundamentals
98 questions
Use Quizgecko on...
Browser
Browser