At what layer of the OSI model does the IPsec encryption protocol operate quizlet?

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (20)

amazon and rackspace both utilize what virtualization software below to create their cloud environments?

citrix xen

at what layer of the OSI model does the IPSec encryption protocol operate?

network layer

digital certificates are issued by organizations known as what term?

certification authorities

the key management phase of IPSec is reliant on which two services below?

internet key exchange, internet security association and key management protocol

the original version of the secure hashing algorithm (SHA) was developed by the NSA, and used a hash of what length?

160 bit

the ppp headers and trailers used to create a ppp frame that encapsulates network layer packets vary between 8 and 10 bytes in size due to what field?

FCS

what authentication protocol sends authentication information in cleartext without encryption?

PAP

what encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?

TKIP

what protocol below is a Microsoft proprietary protocol first available in windows vista?

SSTP

what security principle provides proof of delivery and proof of the sender's identity?

non-repudiation

what two different types of encryption can be used by IPSec during data transfer?

encapsulating security protocol,

what two key lengths are the most popular for the SHA-2 hashing algorithm?

512, 256

what two options below are AAA services?

radius, tacacs+

what two protocols below are data link layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?

slip

when using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

vpn gateway

when using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?

in an authorization file on the host where the SSH server is

which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

a SecurID key chain fob from RSA security generates a password that changes how often?

every 60 seconds

how often should administrators and network users be required to change their password?

60 days

the combination of a public key and a private are known by what term below?

key pair

Sets with similar terms

Network+ Guide to Networks 7th ed. Quiz Ch. 7

47 terms

leroy_green3

Chapter 7

51 terms

Jamsey_Scheidell

Network + chapter 7

37 terms

lunarshot5

HW Chapter 7

20 terms

victoria_mann4

Sets found in the same folder

Network+ 8th Edition Chapter 7

25 terms

Craig_Cozze

Network+ 8th Edition Chapter 12

25 terms

Craig_Cozze

Network+ 8th Edition Chapter 8

71 terms

Ramirorubio

Network+ ch 7 - Cloud Computing and Remote Access

30 terms

doopydoos-square

Other sets by this creator

Audio Principles Questions

2 terms

Ally_Cuddles

networking principles questions

6 terms

Ally_Cuddles

Networking Principles

5 terms

Ally_Cuddles

module 3 quiz

32 terms

Ally_Cuddles

Verified questions

computer science

True or false? A local variable can be accessed by all the functions in a program.

Verified answer

computer science

Write a program that will ask the user to enter the amount of a purchase. The program should then compute the state and county sales tax. Assume the state sales tax is 5 percent and the county sales tax is 2.5 percent. The program should display the amount of the purchase, the state sales tax, the county sales tax, the total sales tax, and the total of the sale (which is the sum of the amount of purchase plus the total sales tax). Hint: Use the value 0.025 to represent 2.5 percent, and 0.05 to represent 5 percent.

Verified answer

computer science

Assume that a = 1, b = 2, and c = 2. What is the value of each of the following Boolean expressions? a. (a > 1) OR (b = c) b. [(a + b) > c] AND (b < c) c. NOT (a = 1) d. NOT [(a = b) OR (b = c)] e. (a = 1) AND (b = 1) AND (c = 2)

Verified answer

computer science

Write a while loop that lets the user enter a number. The number should be multiplied by 10, and the result assigned to a variable named product. The loop should iterate as long as product is less than 100.

Verified answer

Recommended textbook solutions

At what layer of the OSI model does the IPsec encryption protocol operate quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

At what layer of the OSI model does the IPsec encryption protocol operate quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

At what layer of the OSI model does the IPsec encryption protocol operate quizlet?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

At what layer of the OSI model does the IPsec encryption protocol operate quizlet?

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

Other Quizlet sets

Chapter 17: From Gene to Protein

39 terms

Hannah_Nielsen49

EBCP Midterm

53 terms

sophiecrane9PLUS

Economics Midterm - Mayo

108 terms

alaina-hago

Setup and Config 3

25 terms

maf3799

Related questions

QUESTION

What is the term for blocking an IP address that has been the source of suspicious activity?

15 answers

QUESTION

Concerning Hoftede's Cultural Dimensions, a society that values web site designs that incorporates navigation schemes intended to prevent users form becoming lost:

2 answers

QUESTION

T or F: A(n) key is the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message.

2 answers

QUESTION

Which term from the list below represents the entire cryptographic operation i.e. the algorithm, key, and key management functions?

5 answers

What layer of the OSI model does the IPSec encryption protocol operate?

The IPsec protocol suite operates at the network layer of the OSI model. It runs directly on top of IP (the Internet Protocol), which is responsible for routing data packets. Meanwhile, SSL operates at the application layer of the OSI model.

At which layer of the OSI protocol stack does IPSec function quizlet?

IPsec encryption works at Layer 3 of the OSI model. TCP and UDP both offer encryption methods at Layer 4 of the OSI model.

Which layer of the OSI model performs the process to process communication using segments?

The message is sent to the transport layer where data is segmented, and then the network layer breaks the segments into packets. Then, the packets are sent from the network layer to the data link layer, where packets are further broken down into frames.
A network switch is a physical device that operates at the Data Link layer of the Open Systems Interconnection (OSI) model -- Layer 2.