4. In tunnel-mode IPSec, i authentication is done beoreencryption, what sequence o headers would we havein the packets? (The headers include AH (Authentica-tion Header), ESP (Encapsulation Security Payload),IP, TCP or UDP.)
查看答案
5. Packet-f lter vs. application-proxy f rewalls? (Com-pare their purpose and where they are implemented inLinux systems.)
6. Virus vs. worm? (Compare their characteristics andmodel o replication.)
7. DoS (denial o service) vs. buer over ow attack?(Compare their purpose and operations.)
8. In what situation will an IDS (intrusion detectionsystem) such as Snort have a alse positive or alsenegative?