Chapter 7 Essay Questions
What two different types of encryption can be utilized with IPsec?
Authentication Header and Encapsulating Security Payload
Why is the DTLS (Datagram Transport Layer Security) protocol used for streaming applications that need security?
DTLs relies on UDP instead of TCP which minimized delays however applications using DTLS must provide their own means of packets reordering flow control and reliability assurance
All types of remote access techniques connecting to a network require at least one of what two different types of remote access server.
Dedicated devices and software running on a server
How is the CIA triad used to evaluate encryption methods?
To protect data at rest, in use, and in motion, encryption methods are primarily evaluated by three benchmarks:* confidentiality-Data can only be viewed by its intended recipient or at its intended destination.* integrity-Data is not modified in the time after the sender transmits it and before the receiver picks it up.* availability-Data is available and accessible to the intended recipient when needed, meaning the sender is accountable for successful delivery of the data.Together, these three principles form the standard security model called the CIA (confidentiality, integrity, and availability) triad.
What is the PPP (Point-to-Point Protocol), and how does it work?
a data link layer communication protocol used to establish a direct connection between two nodes it connects two routers directly without any host or any other network device in between
What is the difference between a virtual firewall and a software firewall?
a virtual firewall can monitor virtual machines
How does public key encryption work?
data is encrypted using two keys, one known to the user and the other is public key associated with the user
What are some of the features that all cloud services usually have in common?
good for resource pooling and elasticity, self-service and on-demand services
Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.
it allows the client and server to introduce themselves to each other and establishes terms for how they will securely exchange data.
When deploying cloud services, what are some of the deployment models you might encounter?
public, private, community, hybrid
