题目内容

2. How can we combine the private key algorithm andthe public key algorithm?

查看答案
更多问题

3. Where do we use transport-mode IPSec and tunnel-mode IPSec, respectively? What parts o the packetsdo they encrypt?

4. In tunnel-mode IPSec, i authentication is done beoreencryption, what sequence o headers would we havein the packets? (The headers include AH (Authentica-tion Header), ESP (Encapsulation Security Payload),IP, TCP or UDP.)

5. Packet-f lter vs. application-proxy f rewalls? (Com-pare their purpose and where they are implemented inLinux systems.)

6. Virus vs. worm? (Compare their characteristics andmodel o replication.)

答案查题题库