……… mode is used whenever either end of a security association is gateway. COMPUTER / By admin ATunnel BEncapsulating CTransport DGateway Answer Detail comments (0)
In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port COMPUTER / By admin Ai, ii, iii and iv only Bi, iii, iv and v only Cii, iii, iv and v only DAll i, ii, iii, iv and v Answer Detail comments (0)
State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. COMPUTER / By admin ATrue, False BFalse, True CTrue, True DFalse, False Answer Detail comments (0)
On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… COMPUTER / By admin ASSL handshake protocol BSSL authentication protocol CSSL record protocol DSSL cipher protocol Answer Detail comments (0)
While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. COMPUTER / By admin A420 B1032 C443 D322 Answer Detail comments (0)
At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. COMPUTER / By admin ASSL handshake protocol BSSL authentication protocol CSSL record protocol DSSL cipher protocol Answer Detail comments (0)
The … Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. COMPUTER / By admin AIPsec BNetsec CPacketsec DProtocolsec Answer Detail comments (0)
In … mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. COMPUTER / By admin ATunneling BEncapsulation CBoth A and B DNone of the above Answer Detail comments (0)
The …………….is used to provide integrity check authentication and encryption to IP datagram. COMPUTER / By admin ASSL BESP CTSL DPSL Answer Detail comments (0)
The primary goal of the …. protocol is to provide a private channel between communicating application which ensures privacy of data authentication of the partners and integrity. COMPUTER / By admin ASSL BESP CTSL DPSL Answer Detail comments (0)