What are the areas of protection provided by IPsec?
What will be an ideal response?
IPsec provides three areas of protection that correspond to three IPsec protocols:
* Authentication-IPsec authenticates that packets received were sent from the source that is identified in the header of the packet and no man-in-the-middle attacks or replay attacks took place to alter the contents of the packet. This is accomplished by the Authentication Header (AH) protocol.
* Confidentiality-By encrypting the packets, IPsec ensures that no other parties were able to view the contents. Confidentiality is achieved through the Encapsulating Security Payload (ESP) protocol. ESP supports authentication of the sender and encryption of data.
* Key management-IPsec manages the keys to ensure that they are not intercepted or used by unauthorized parties. For IPsec to work, the sending and receiving devices must share a key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which generates the key and authenticates the user using techniques such as digital certificates.
You might also like to view...
Select the false statement. The new operator:
a. Can attempt to allocate as much memory as the programmer requests. b. Returns a pointer to a location in memory. c. Can indicate failure differently on different compilers. d. Throws a bad_alloc exception regardless of what function is registered with set_new_handler.
The following compilers exist on our LINUX system: cc, gcc, g++, and f77. These compilers were located in the /usr/bin and not in the /bin directory. We used the following command to locate the cc compiler and similar commands to locate other compilers. If a command does not display anything for a given compiler name, it means that that compiler doesn’t exist.
What will be an ideal response?
A comment begins with the ____ symbols.
A. ?& B. %= C. %+ D. /*
A query that prompts you for criteria before running the query
a. Calculated query b. Parameter query c. Crosstab query