Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 107
نمايش فراداده

Q&A

1:

Name three types of VPN solutions.

2:

What are the four major functions of IPSec?

3:

Describe the two HMAC algorithms that are commonly used today to provide data integrity.

4:

What are the three peer authentication methods used in IPSec?

5:

There are two main IPSec framework protocols available. State their names and give a brief explanation of what they do.

6:

Both ESP and AH can be applied to IP packets in two different ways. List those two modes and explain the difference between them.

7:

List the functions for which IKE Phase 1 is responsible.

8:

List the functions for which IKE Phase 2 is responsible.

9:

What steps should be completed before configuring a device to use IPSec?

10:

Describe briefly how the IPSec process works.