IPSec

60 views
Skip to first unread message

Anil Kumar K

unread,
Sep 16, 2018, 11:11:10 PM9/16/18
to cissp...@googlegroups.com
Which one of the following attacks is MOST effective against an Internet Protocol Security(IPSEC) based virtual private network (VPN)?

a. Man-in-the-middle
b. Replay
c. Brute force
d. Traffic analysis

Uday Kiran

unread,
Sep 17, 2018, 1:21:45 AM9/17/18
to cissp...@googlegroups.com
This one I like and tricky, I wanted to know the answer to this.

As far as I know, it is either Brute Force OR Man In the Middle, all cases MITM won't work; it should be BruteForce, C 

Regards,
Uday Kiran

--
===========================================================
Another resource brought to you by CCCure for our Learners
 
Having any issues, contact us at: sup...@cccure.com
 
Visit our NEW quiz at: https://cccure.education/
 
Visit our learning portal at: https://cccure.training
 
Visit the CCCure web store at: https://www.cccure.com
===========================================================
---
You received this message because you are subscribed to the Google Groups "CISSP Study Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cissptalks+...@googlegroups.com.
To post to this group, send email to cissp...@googlegroups.com.
Visit this group at https://groups.google.com/group/cissptalks.
To view this discussion on the web visit https://groups.google.com/d/msgid/cissptalks/CY4PR03MB2421E0DD1543F302E8913BF3AB1E0%40CY4PR03MB2421.namprd03.prod.outlook.com.
For more options, visit https://groups.google.com/d/optout.


--
Regards,
Uday Kiran

Venky T

unread,
Sep 17, 2018, 1:24:35 AM9/17/18
to cissp...@googlegroups.com
I guess it's A. MITM

--

mohdilyasali

unread,
Sep 17, 2018, 2:43:08 AM9/17/18
to cissp...@googlegroups.com

 

Answer: B Active attacks find identities by being a man-in-the-middle or by replacing the responder in the negotiation. The attacker proceeds through the key negotiation with the attackee until the attackee has revealed its identity. In a well-designed system, the negotiation will fail after the attackee has revealed its identity because the attacker cannot spoof the identity of the originally-intended system. The attackee might then suspect that there was an attack because the other side failed before it gave its identity. Therefore, an active attack cannot be persistent because it would prevent all legitimate access to the desired IPsec system. Not C: Traffic analysis is a good attack but not the most effective as it is passive in nature, while Man in the middle is active.

Anil Kumar K

unread,
Sep 17, 2018, 2:45:30 AM9/17/18
to cissp...@googlegroups.com
IPSec is protected by reply attacks.


From: cissp...@googlegroups.com <cissp...@googlegroups.com> on behalf of mohdilyasali <mohdil...@gmail.com>
Sent: Monday, September 17, 2018 12:14:12 PM
To: cissp...@googlegroups.com
Subject: RE: [CCCure_CISSP_Talks] IPSec
 

Venky T

unread,
Sep 20, 2018, 6:14:34 PM9/20/18
to cissp...@googlegroups.com
Couldn't understand your feedback - IPSEC is "protected" by replay attacks ?

Can you pls explain with answer explanation provided for that question as well ?

-- V.T.


Reply all
Reply to author
Forward
0 new messages