+ All Categories
Home > Documents > IS3220 lab 8

IS3220 lab 8

Date post: 23-Jan-2016
Category:
Upload: damon-mrfixit-baker
View: 918 times
Download: 6 times
Share this document with a friend
Description:
Lab 8 for IS3220
Popular Tags:
6
Damon Baker (15622970) June 24, 2015 IS3220 [email protected] Lab 8
Transcript
Page 1: IS3220 lab 8

Damon Baker (15622970) June 24, 2015IS3220 [email protected]

Lab 8

Page 2: IS3220 lab 8

Damon Baker (15622970) June 24, 2015IS3220 [email protected]

Page 3: IS3220 lab 8

Damon Baker (15622970) June 24, 2015IS3220 [email protected]

Page 4: IS3220 lab 8

Damon Baker (15622970) June 24, 2015IS3220 [email protected]

Page 5: IS3220 lab 8

Damon Baker (15622970) June 24, 2015IS3220 [email protected]

Page 6: IS3220 lab 8

Damon Baker (15622970) June 24, 2015IS3220 [email protected]. The alternative to Encapsulating Security Protocol (ESP) is VPN.

2. One of the main drawbacks of the File Transfer Protocol (FTP) is that

a. It was the first file transfer protocol invented in the IP suite

b. It does not encrypt content.

c. It does not encrypt passwords.

d. It is widely used by web sites.

e. Both b and c

3. An IPSec tunnel is step up in two stages. In the Information column of the Frame Summary, these steps are called main mode and aggressive mode.

4. The first phase of setting up an IPsec tunnel is called tunnel phase.

5. The second phase of setting up an IPsec tunnel is called shared secret.

6. SA stands for Security Association. An equivalent word would be SAD.

7. The protocol used for setting up the “administrative” tunnel in IPsec is IKE.

8. ISAKMP stands for _____.

a. Internet Security Association and Key Management Protocol

b. Internet Secure Admission Key Management Protocol

c. Internet Security Association and Key Maintenance Protocol

d. Internet Secure Admission Key Maintenance Protocol

e. Internet Security Association and Key Management Provisioning


Recommended