1.Which of the following encryption algorithms uses two large prime numbers?
2. What can be said about asymmetric encryption?
3. What protection characteristics are in use with IPsec transport mode?
4. Which of the following defines the private, non-routable IP address ranges?
5. Which DNS record maps an IP address to a hostname? ...