Chat with us, powered by LiveChat Network Security: 2,7,8 - Credence Writers

Network Security: 2,7,8

2.1 What are the essential ingredients of a symmetric cipher?
2.2 What are the two basic functions used in encryption algorithms?
2.3 How many keys are required for two people to communicate via a symmetric cipher?
2.4 What is the difference between a block cipher and a stream cipher?
2.5 What are the two general approaches to attacking a cipher?
2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
2.7 What is triple encryption?
2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

7.1 What is the basic building block of an 802.11 WLAN?
7.2 Define an extended service set.
7.3 List and briefly define IEEE 802.11 services.
7.4 Is a distribution system a wireless network?
7.5 How is the concept of an association related to that of mobility?
7.6 What security areas are addressed by IEEE 802.11i?
7.7 Briefly describe the five IEEE 802.11i phases of operation.
7.8 What is the difference between TKIP and CCMP?

8.1 What is the difference between RFC 5321 and RFC 5322?
8.2 What are the SMTP and MIME standards?
8.3 What is the difference between a MIME content type and a MIME transfer encoding?
8.4 Briefly explain base64 encoding.
8.5 Why is base64 conversion useful for an e-mail application?
8.6 What is S/MIME?
8.7 What are the four principal services provided by S/MIME?
8.8 What is the utility of a detached signature?
8.9 What is DKIM?

error: Content is protected !!