1. BAIT1103 INTERNET SECURITY
Tutorial 6
1. Give examples of applications of IPSec.
2. What services are provided by IPSec?
3. What is the difference between a transport mode and tunnel mode?
4. What is a replay attack?
5. What are the basic approaches to bundling SAs?
6. What are the roles of the Oakley key determination protocol and
ISAKMP in IPSec?
Past Year Questions
1. IP Security (IPSec) provides a set of security algorithms and a general
framework that allows a pair of communicating entities to use whichever
algorithms that provides appropriate security for the communication.
i.
Describe TWO (2) benefits that are provided by the IPSec.
ii.
What are the THREE (3) features that are provided by the IPSec?
iii.
Give ONE (1) example of application of the IPSec.
2. Figure 2 shows End-to-end versus End-to-intermediate authentication.
Figure 2: End-to-end versus End-to-intermediate authentication
2. BAIT1103 INTERNET SECURITY
i.
To achieve End-to-end and End-to-intermediate authentication, the IP
security transport mode and tunnel mode are essential in this process.
State which mode does A, B and C use in Figure 2.
ii.
Give ONE (1) reason why the transport mode and tunnel mode are
important and support your explanation with ONE (1) example each.
3. Internet Protocol Security (IP security) is a protocol suite for securing
Internet Protocol (IP) communications by authenticating and encrypting
each IP packet of a communication session. Describe FOUR (4)
applications of IP security that can provide benefits for the Internet.