December 2011
Beginner
552 pages
13h 30m
English
The following questions reinforce the concepts that were covered in this chapter.
1. How long, in bits, is the DES key?
2. True or False: In 3DES, the same key is used to encrypt at each of the three stages.
3. Define a hash in your own words.
4. What is used to create a digital signature?
5. Define authentication and provide an example.
6. Define authorization and provide an example.
7. A hash check occurs at what point in the operation of MD5?
8. Of the security protocols covered in this chapter, which of them use generic routing encapsulation (GRE)?
9. Describe several security benefits of L2TP.
10. What are the three core SSH capabilities?
Read now
Unlock full access