Reference no: EM132456182
Question 1. What is a multiple-packet attack and what is needed by an IDPS to detect one? Provide an example.
Question 2. List the seven layers of the OSI model, and give an example of what each one does in a real-world environment.
Question 3. What are the signatures of malformed packets that misuse the SYN and FIN flags? Briefly describe each.
Question 4. What is a Feistel network and what is its purpose?
Question 5. Compare and contrast block cipher with stream cipher.
Question 6. What is a MAC tag and how does it work?
Question 7. Describe 802.1x authentication.
Question 8. Describe forged deauthentication.
Question 9. Discuss how an ESS works.
Question 10. Why should you use caution when using multiple APs?
Question 11. Compare and contrast analog and digital RF signals.
Question 12. Describe the purpose of the CVE and how it works.
Question 13. Discuss defense in depth.
For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).
Question 14. Discuss variable length subnet masking.
Question 15. What is a distance-vector routing protocol? Give one example.