Need the key terms fill in blanks answered cost records til he and IPSec uses En
ID: 3921682 • Letter: N
Question
Need the key terms fill in blanks answered cost records til he and IPSec uses Encapsulating Security Payload (ESP) to provide confidentiality service at the datagram level. Explain authentication methods and the security implications in their use Password-based authentication is still the most widely used because of cost and ubiquity Key Terms AAA (265) access control (272) accounting (265) authentication (265) Authentication Header (AH) (290) authentication server (AS) (267) authorization (265) content protection (289) context protection (289) discretionary access control (DAC) (273) Encapsulating Security Payload (ESP) (290) identification (266) Internet Key Exchange (IKE) (293) Internet Protocol Security (IPsec) (288) Internet Security Association and Key Management Kerberos (267) key distribution center (KDC) (267) Layer 2 Tunneling Protocol (L2TP) (284) mandatory access control (MAC) (273) Oakley (291) Point-to-Point Tunneling Protocol (PPTP) (282) remote access server (RAS) (265) role-based access control (RBAC) (274) rule-based access control (RBAC) (274) Secure Key Exchange Mechanism for Internet (SKEMID (291) security association (SA) (289) ticket-granting server (TGS) (267) virtual private network (VPN) (287) Protocol (ISAKMP) (291) Chapter 11: Authentication and Remote AccessExplanation / Answer
1) Kerberos is an authentication model designed around the concept of using tickets for accessing objects
2) Role-based access control (RBAC) is designed around the type of tasks people perform.
3) A formal manner of describing the necessary and sufficient portions of the IPsec protocol series to achieve a specific level of protection is a(n) Security Association (SA).
4) Mandatory access control (MAC) describes a system where every resource has access rules set for it all of the time.
5) A(n) Virtual Private Network (VPN) is a collection of protocols used to secure network traffic over a nonsecure network.
6) In IPsec, a security association is defined by a specific combination of Authentication Header (AH) and Encapsulating Security Payload (ESP).
7) The protection of the data portion of a packet is Content protection.
8) The protection of the header portion of a packet is Context protection.
9) Internet Security Association and key Management Protocol (ISAKMP) is a key management and exchange protocol used with IPsec.
10) The process of comparing credentials to those established during the identification process is referred to as Authentication.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.