1/What is a multiple-packet attack and what is needed by an IDPS to detect one?  Provide an example.

2/ List the seven layers of the OSI model, and give an example of what each one does in a real-world environment.

3/ What are the signatures of malformed packets that misuse the SYN and FIN flags?  Briefly describe each.

4/What is a Feistel network and what is its purpose?

5/Compare and contrast block cipher with stream cipher.

6/What is a MAC tag and how does it work?

7/Describe 802.1x authentication.

8/Describe forged deauthentication.

9/Discuss how an ESS works.

10/Why should you use caution when using multiple APs?

11/Compare and contrast analog and digital RF signals.

12/Describe the purpose of the CVE and how it works.

13/Discuss defense in depth.

For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).

14/Discuss variable length subnet masking.

15/What is a distance-vector routing protocol?  Give one example.

    • 2 years ago
    • 35

    Purchase the answer to view it

    • attachment
    • attachment
    • attachment