Review Questions


1:

What are the two key features that secure the Mobile IP registration messages?

2:

What prevents a rogue node from setting up the mobility binding for the Mobile Node on the Home Agent?

  1. All Mobile IP control packets traverse the home AAA server, where the packet is authenticated.

  2. The Home Agent discards any Mobile IP control packet if the IP source address does not equal that of the Mobile Node's home address.

  3. The Mobile Node and Home Agent share a security association, and all Mobile IP control packets must be authenticated between the Mobile Node and Home Agent.

  4. The FA performs egress filtering and drops any Mobile IP control packets that do not emanate from the Mobile Node's CoA.

3:

List the different types of Mobile IP authentication extensions, and describe their purpose.

4:

Describe how the MHAE and FHAE can secure the same RRQ.

5:

What elements comprise a security context? How is a security context identified?

6:

What is the standard hash algorithm that must be supported in a Mobile IPv4 deployment?

7:

To verify the integrity of a message that has an authentication extension appended, the recipient does which of the following?

  1. The recipient compares the authenticator value in the appended extension to that stored in the security association for the sender.

  2. The recipient computes a cryptographic hash on the authenticator value and compares it to the value stored in the security context.

  3. The recipient indexes the security association with the SPI and finds the authenticator value to compare to the value in the extension.

  4. The recipient computes a cryptographic hash of the message and compares it to the authenticator value in the appended extension.

8:

Replay protection in registration messages is needed for which of the following reasons?

  1. To thwart off reflection and replay attacks, where the message is retransmitted at a later time

  2. To ensure that data flow is not disrupted and traffic is not redirected by the attacker

  3. To guarantee that a unique field exists in the registration messages

  4. A and B only

  5. A and C only

  6. A, B, and C

9:

Briefly describe the timestamp replay protection method.

10:

Briefly describe the nonces replay protection method.

11:

How does the Mobile Node secure registration messages using the FA Challenge mechanism?

  1. The Mobile Node appends a valid challenge value to a registration message that it learns from the FA's advertisements.

  2. The Mobile Node appends a valid challenge value that it learns from its Home Agent in a reply message secured with the MHAE.

  3. The Mobile Node appends a valid challenge value from a pool of challenge values with which it is preconfigured.

  4. The Mobile Node appends a valid challenge value that it learns from the FA through link-layer signaling.

12:

What is the challenge window?

13:

The MN-AAA Authentication Extension can secure RRQs and registration replies.

  1. True

  2. False

14:

Why is the session index extension used in Cisco dynamic security association and key distribution?



    Mobile IP Technology and Applications
    Mobile IP Technology and Applications
    ISBN: 158705132X
    EAN: 2147483647
    Year: 2005
    Pages: 124

    Similar book on Amazon

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net