MidtermStudyGuide2011

MidtermStudyGuide2011 - EE8213 Midterm Study Guide Q1....

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1 EE8213 Midterm Study Guide Q1. Where exactly does the SSL protocol fit within the TCP/IP protocol stack? a. at the network layer b. at the physical layer c. between the data link layer and the network layer d. between the Transport (TCP) layer and Application Layer Q2. Which of the following provide authentication for an SSL connection? a. digital certificates b. ciphers c. secret key d. IP address Q3. Describe the four phases of the security wheel. 1. Implementation. Applying the security policy and implementing the following security solutions: • Authentication • Firewalls • VPN • Vulnerability patching 2. Monitoring the network. Involves validating the security implementation conducted in the first stage by detecting violations of the security policy. 3. Testing the security of the network. Involves validating the effectiveness of the security policy implementation through system auditing and vulnerability scanning. 4. Improving the security of the network. Involves using the information gathered during
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

MidtermStudyGuide2011 - EE8213 Midterm Study Guide Q1....

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online