Identify a successful three-way


1.  Identify the cryptosystem that makes use of two different keys to encrypt and decrypt a message.

2. Access control right based on policy

1. Rule Based

2. Mandatory

3. Discretion

4. Role Based

3. Identify a connection-oriented protocol. ¬¬¬¬SHA-1 and MD5 are examples of which algorithm.

5. T or F: One of the factors of credential validation is somewhere you are.

6. T or F: Firewalls filters Internet traffic based on port implementation only.

7. Access control rights granted on the sensitivity of the data

1. Rule Based

2. Mandatory

3. Discretion

4. Role Based

8. What type of next generation technology grants access based on human attributes?

9. AES, DES, IDEA, and RC5 are examples of which algorithm.

10. T or F: One of the factors of credential validation is something you have.

11. What is a disadvantage of a host intrusion detection system?

12. Identify a limitation within a firewall as it pertains to data.

13. A combination of two types of intrusion detection systems are called

14. Access control rights granted based on the duties performed by a group

1. Rule Based

2. Mandatory

3. Discretion

4. Role Based


15. The result of applying an encryption algorithm to the original message.

16. What is the block cipher mode that incorporates the last encrypt block in the next block to be encrypted

17. The art of secret communication

1. Cryptanalyst

2. Cryptanalysis

3. Cryptography

4. Ctyptosystem



18. T or F: One of the factors of credential validation is something you had.

19. Which intrusion detection system provides near real time detection of potential threats?

20. T or F: IPSec encompasses the technology of AH and ESPN?

21. What is the difference between an intrusion detection system and a intrusion detection system?
22. T or F: SSL is used for HTTPS?


23. RSA, DSA, and Diffie-Hellman are examples of which algorithm.


24. T or F: One of the factors of credential validation is someone you knew

25. What is the DoD model equivalent to the OSI model called?

26. By signing a document with your digital signature you are not able to refute that you sent it. This is an example

27. At which layer of the OSI model does the protocol IP operates?
28. At which layer of the OSI model does the protocol TCP operates?

29. Identify a successful three-way handshake?

30. Identify the following ports:
• 443
• 25
• 110
• 8080
• 161
• 22
• 21

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Identify a successful three-way
Reference No:- TGS01195406

Now Priced at $45 (50% Discount)

Recommended (94%)

Rated (4.6/5)

A

Anonymous user

3/14/2016 7:05:47 AM

For the following computer network security questions, provide answers to all of them as per the instructions and guidelines provided. Keep in mind that the paper must follow APA instructions. Q1. Recognize the cryptosystem which makes use of two dissimilar keys to encrypt and decrypt the message. Q2. What kind of next generation technology grants access based on the human features? Q3. Write down the demerit of a host intrusion detection system? Q4. Recognize a limitation within a firewall as it relevant to data. Q5. A combination of two kinds of intrusion detection systems are known as? Q6. Determine the block cipher mode which incorporates the last encrypt block in the subsequent block to be encrypted. Q7. Name the intrusion detection system gives near real time detection of the potential threats? Q8. Write down the difference between an intrusion detection system and the intrusion detection system?