2. How can we combine the private key algorithm andthe public key algorithm?
查看答案
3. Where do we use transport-mode IPSec and tunnel-mode IPSec, respectively? What parts o the packetsdo they encrypt?
4. In tunnel-mode IPSec, i authentication is done beoreencryption, what sequence o headers would we havein the packets? (The headers include AH (Authentica-tion Header), ESP (Encapsulation Security Payload),IP, TCP or UDP.)
5. Packet-f lter vs. application-proxy f rewalls? (Com-pare their purpose and where they are implemented inLinux systems.)
6. Virus vs. worm? (Compare their characteristics andmodel o replication.)