Chapter Review Questions

     
1:

Explain what non- repudiation is in relation to cryptography and how it is commonly implemented.

2:

Does IPSec use symmetric or asymmetric cryptography to encrypt IP datagrams? Describe your answer. Describe the difference between an IPSec Authentication Header and an IPSec Encapsulated Security Payload. Describe the kind of secrecy each offers, e.g., privacy, authentication, non-repudiation, and so on.

3:

List at least four way in which Bastille can improve the overall security of a system.

4:

What is an IPFilter kernel state table? How can the state table improve the performance of IPFilter?

5:

What are the private/public keys in HIDS used for? Where are they generated, and how should they be distributed between all nodes in the HIDS network?



HP-UX CSE(c) Official Study Guide and Desk Reference
HP-UX CSE(c) Official Study Guide and Desk Reference
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net