Chapter Review Questions

The following questions reinforce the concepts that were covered in this chapter.

1. How long, in bits, is the DES key?

2. True or False: In 3DES, the same key is used to encrypt at each of the three stages.

3. Define a hash in your own words.

4. What is used to create a digital signature?

5. Define authentication and provide an example.

6. Define authorization and provide an example.

7. A hash check occurs at what point in the operation of MD5?

8. Of the security protocols covered in this chapter, which of them use generic routing encapsulation (GRE)?

9. Describe several security benefits of L2TP.

10. What are the three core SSH capabilities?

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.191.134