Question 1: In addition, a mutual authentication and key exchange protocol ________ (IKE) was defined to create and manage security associations. | |||
|
Question 2: The KAME stack, that is included in Mac OS X, NetBSD and ________. | |||
|
Question 3: NLSP was based on the SP3 protocol that was published by ________, but designed by the Secure Data Network System project of the National Security Agency (NSA). | |||
|
Question 4: IPsec is officially specified by the ________ (IETF) in a series of Requests for Comment addressing various components and extensions, including the official capitalization style of the term. | |||
|
Question 5: The KAME project also implemented complete IPsec support for NetBSD, ________. | |||
|
Question 6: IPsec protocols were originally defined in ________ RFC 1825 and RFC 1829, published in 1995. | |||
|
Question 7: The FreeS/WAN project made the first complete and open source implementation of IPsec for ________. | |||
|
Question 8: ESP also supports encryption-only and ________-only configurations, but using encryption without authentication is strongly discouraged because it is insecure. | |||
|
Question 9: ________ (IKE and IKEv2) to set up a security association (SA) by handling negotiation of protocols and algorithms and to generate the encryption and authentication keys to be used by IPsec. | |||
|
Question 10: Tunnel mode is used to create ________ for network-to-network communications (e.g. | |||
|
|