Describe the two IPSec modes of operation.

What will be an ideal response?


IPSec works in two different modes: transport mode and tunnel mode. Transport mode is used to provide secure communications between hosts over any range of IP addresses. Tunnel mode is used to create secure links between two private networks. Tunnel mode is the obvious choice for VPNs; however, there are some concerns about using tunnel mode in a client-to-site VPN because IPSec by itself does not provide for user authentication. However, when combined with an authentication system like Kerberos, IPSec can authenticate users.

Computer Science & Information Technology

You might also like to view...

What is the 7×7 guideline?

A) No more than seven slides in a presentation without some type of graphic and no more than levels in your bulleted lists B) No more than seven lines of text and no more than seven major words per line on a slide C) No more than seven fonts and seven sizes of text per presentation D) No more than seven transitions and seven animations per presentation

Computer Science & Information Technology

Inside the parentheses of a catch block are the ____ of the exception that’s thrown and a parameter name used to receive the exception.

a. return value b. try type c. data type d. catch type

Computer Science & Information Technology

The substr function returns a subscript indicating where a substring starts in the specified string.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The criteria used to assess the quality of an architectural design should be based on system A) accessibilityB) controlC) dataD) implementation

What will be an ideal response?

Computer Science & Information Technology