4 confidentiality is provided by an encryption format

This preview shows page 5 - 6 out of 6 pages.

4.Confidentiality is provided by an encryption format known as__ENCAPSULATING SECURITY PAYLOAD________ .5.A __REPLAY________attack is one in which an attacker obtains a copy of anauthenticatedpacket and later transmits it to the intended destination.6.Authentication makes use of the__HMAC_______ message authentication code.7.A security association is uniquely identified by three parameters: SecurityProtocol Identifier, IP Destination Address, and __SECURITY PARAMETERSINDEX______ .8.The _KEY MANAGEMENT_________facility is concerned with the secure exchangeof keys.9._ENCAPSULATING SECURITY PAYLOAD________can be used to provideconfidentiality, data origin authentication,connectionless integrity, an anti-replay service, and traffic flow confidentiality.10. IPsec provides security services at the_IP_______layer by enabling a system toselect required security protocols, determine the algorithms to use for theservices and put in place any cryptographic keys required to provide therequested services.11. The selectors that determine a Security Policy Database are: Name, Local andRemote Ports, Next Layer Protocol, Remote IP Address, and___LOCAL IPADDRESS______ .12. The term _SECURITY ASSOSIATION BUNDLE________ refers to a sequence of SAsthrough which traffic must beprocessed to provide a desired set of IPsec services.
We have textbook solutions for you!
/Systems-Architecture-7th-Edition-9781305080195-1466/
The document you are viewing contains questions related to this textbook.
Chapter 9 / Exercise 3
Systems Architecture
Burd
Expert Verified
Network Security Essentials Applications and Standards, 5thEdition, by WilliamStallings13. Generic in that it does not dictate specific formats, the __OAKLEY KEYDETERMINATION PROTOCOL_______is a key exchangeprotocol based on the Diffie-Hellman algorithm with added security.14. Three different authentication methods can be used with IKE key determination:Public key encryption, symmetric key encryption, and__DIGITALSIGNATURES_______ .15. At any point in an IKE exchange the sender may include a _CERTIFICATEREQUEST________ payload torequest the certificate of the other communicating entity.
End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Computer Networks, Cryptography, Public key infrastructure, Stallings, Network Security Essentials, Security Essentials Applications
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Systems Architecture
The document you are viewing contains questions related to this textbook.
Chapter 9 / Exercise 3
Systems Architecture
Burd
Expert Verified

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture