Interesting traffic triggers the security policy for

This preview shows page 16 - 18 out of 25 pages.

Interesting traffic triggers the security policy for the packets, which means that the system sending the packetapplies the appropriate encryption and/or authentication to the packet. When an incoming packet is determinedto be "interesting," the host verifies that the inbound packet has been encrypted and/or authenticated properly.GRE works by encapsulating a payload that is, an inner packet that needs to be delivered to a destinationnetwork inside an outer IP packet. GRE tunnel endpoints send payloads through GRE tunnels by routingencapsulated packets through intervening IP networks. Other IP routers along the way do not parse thepayload (the inner packet); they only parse the outer IP packet as they forward it towards the GRE tunnelendpoint. Upon reaching the tunnel endpoint, GRE encapsulation is removed and the payload is forwardedalong to its ultimate destination.
6.What is WPA2? Explain AAA in brief.
Intake II ICT60215 Advanced Diploma of Network Security06/2021V3.0Written Examination16of 25
RTO PROVIDER CODE: 91151CRICOS CODE: 02668Ftoward committing identity theft, such as accessing your bank or investment accounts without yourknowledge.In some instances, attackers could also have the ability to manipulate web pages, turning them intofake websites to collect your information or to install malware on your devices.WiFi Protected Access 2 (WPA2)A year later, in 2004, WiFi Protected Access 2 became available. WPA2 has stronger security and iseasier to configure than the prior options. The main difference with WPA2 is that it uses theAdvanced Encryption Standard (AES) instead of TKIP. AES is able to secure top-secret governmentinformation, so it’s a good option for keeping a personal device or company WiFi safe.The only notable vulnerability of WPA2 is that once someone has access to the network, they canattack other devices connected to the network. This is an issue if a company has an internal threat,such as an unhappy employee, who hacks into the other devices on the company’s network.Accounting Authentication, authorization and (AAA)is a system for tracking user activities on an

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 25 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
N/A
Professor
N/A
Tags
Virtual private network, Wi Fi, Wireless access point

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture