Chapter 7 Essay Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What two different types of encryption can be utilized with IPsec?

Authentication Header and Encapsulating Security Payload

Why is the DTLS (Datagram Transport Layer Security) protocol used for streaming applications that need security?

DTLs relies on UDP instead of TCP which minimized delays however applications using DTLS must provide their own means of packets reordering flow control and reliability assurance

All types of remote access techniques connecting to a network require at least one of what two different types of remote access server.

Dedicated devices and software running on a server

How is the CIA triad used to evaluate encryption methods?

To protect data at rest, in use, and in motion, encryption methods are primarily evaluated by three benchmarks:* confidentiality-Data can only be viewed by its intended recipient or at its intended destination.* integrity-Data is not modified in the time after the sender transmits it and before the receiver picks it up.* availability-Data is available and accessible to the intended recipient when needed, meaning the sender is accountable for successful delivery of the data.Together, these three principles form the standard security model called the CIA (confidentiality, integrity, and availability) triad.

What is the PPP (Point-to-Point Protocol), and how does it work?

a data link layer communication protocol used to establish a direct connection between two nodes it connects two routers directly without any host or any other network device in between

What is the difference between a virtual firewall and a software firewall?

a virtual firewall can monitor virtual machines

How does public key encryption work?

data is encrypted using two keys, one known to the user and the other is public key associated with the user

What are some of the features that all cloud services usually have in common?

good for resource pooling and elasticity, self-service and on-demand services

Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.

it allows the client and server to introduce themselves to each other and establishes terms for how they will securely exchange data.

When deploying cloud services, what are some of the deployment models you might encounter?

public, private, community, hybrid


Ensembles d'études connexes

Exam One History Prep Chapters 1-5

View Set

Physiology nervous system, neurons and synapse

View Set

Lewis Chapter 40 Obesity NCLEX questions

View Set

Article 330-Metal-Clad Cable (Type MC)

View Set

Anatomy Chapter 25 Reproductive System

View Set

chapter 12) Employer Group Health Insurance - Important Factors

View Set