SlideShare a Scribd company logo
1 of 4
5.1 Provide a brief definition of network access control.
5.2 What is an EAP?
5.3 List and briefly define four EAP authentication methods.
5.4 What is EAPOL?
5.5 What is the function of IEEE 802.1X?
5.6 Define cloud computing.
5.7 List and briefly define three cloud service models.
5.8 What is the cloud computing reference architecture?
5.9 Describe some of the main cloud-specific security threats.
6.2 What protocols comprise TLS?
6.3 What is the difference between a TLS connection and a TLS
session?
6.4 List and briefly define the parameters that define a TLS
session state.
6.5 List and briefly define the parameters that define a TLS
session connection.
6.6 What services are provided by the TLS Record Protocol?
6.7 What steps are involved in the TLS Record Protocol
transmission?
6.8 What is the purpose of HTTPS?
6.9 For what applications is SSH useful?
6.10 List and briefly define the SSH protocols.
7.1 What is the basic building block of an 802.11 WLAN?
7.2 Define an extended service set.
7.3 List and briefly define IEEE 802.11 services.
7.4 Is a distribution system a wireless network?
7.5 How is the concept of an association related to that of
mobility?
7.6 What security areas are addressed by IEEE 802.11i?
7.7 Briefly describe the five IEEE 802.11i phases of operation.
7.8 What is the difference between TKIP and CCMP?
8.1 What is the difference between RFC 5321 and RFC 5322?
8.2 What are the SMTP and MIME standards?
8.3 What is the difference between a MIME content type and a
MIME transfer encoding?
8.4 Briefly explain base64 encoding.
8.5 Why is base64 conversion useful for an e-mail application?
8.6 What is S/MIME?
8.7 What are the four principal services provided by S/MIME?
8.8 What is the utility of a detached signature?
8.9 What is DKIM?
9.1 Give examples of applications of IPsec.
9.2 What services are provided by IPsec?
9.3 What parameters identify an SA and what parameters
characterize the nature of a particular SA?
9.4 What is the difference between transport mode and tunnel
mode?
9.5 What is a replay attack?
9.6 Why does ESP include a padding field?
9.7 What are the basic approaches to bundling SAs?
9.8 What are the roles of the Oakley key determination protocol
and ISAKMP in IPsec?
5.1 Provide a brief definition of network access control.5.2.docx

More Related Content

Similar to 5.1 Provide a brief definition of network access control.5.2.docx

Communication Networks: The Complete Guide
Communication Networks: The Complete GuideCommunication Networks: The Complete Guide
Communication Networks: The Complete Guide
DaisyWatson5
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
AGhaKhan01
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
AGhaKhan01
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
NguynTy5
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
Mannu Khani
 

Similar to 5.1 Provide a brief definition of network access control.5.2.docx (20)

Cn question bank
Cn question bankCn question bank
Cn question bank
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
Communication Networks: The Complete Guide
Communication Networks: The Complete GuideCommunication Networks: The Complete Guide
Communication Networks: The Complete Guide
 
Ccna new syllabus
Ccna new syllabusCcna new syllabus
Ccna new syllabus
 
Cn v-sem
Cn v-semCn v-sem
Cn v-sem
 
Qb
QbQb
Qb
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
 
CCNA Interview questions - Networking
CCNA Interview questions - NetworkingCCNA Interview questions - Networking
CCNA Interview questions - Networking
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
IP_Subnet training.pptx
IP_Subnet training.pptxIP_Subnet training.pptx
IP_Subnet training.pptx
 
Id. 04 questions internet technology
Id. 04 questions internet technologyId. 04 questions internet technology
Id. 04 questions internet technology
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabus
 
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
 
subnet.pptx
subnet.pptxsubnet.pptx
subnet.pptx
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Data Communication and Computer Networking
Data Communication and Computer NetworkingData Communication and Computer Networking
Data Communication and Computer Networking
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

More from taishao1

a brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxa brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docx
taishao1
 
A 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxA 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docx
taishao1
 
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
taishao1
 
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
taishao1
 
81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx
taishao1
 
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
taishao1
 
8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx
taishao1
 
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
taishao1
 
8 New Scientist 4 January 2020THE tropics are the most.docx
8  New Scientist  4 January 2020THE tropics are the most.docx8  New Scientist  4 January 2020THE tropics are the most.docx
8 New Scientist 4 January 2020THE tropics are the most.docx
taishao1
 
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
taishao1
 

More from taishao1 (20)

9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx
 
a brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxa brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docx
 
A 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxA 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docx
 
A case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docxA case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docx
 
A 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docxA 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docx
 
a 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docxa 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docx
 
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docxA - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
 
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
 
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
 
875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx
 
81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx
 
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
 
8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx
 
8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx
 
8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx
 
8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx
 
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
 
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
 
8 New Scientist 4 January 2020THE tropics are the most.docx
8  New Scientist  4 January 2020THE tropics are the most.docx8  New Scientist  4 January 2020THE tropics are the most.docx
8 New Scientist 4 January 2020THE tropics are the most.docx
 
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
 

Recently uploaded

IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 

Recently uploaded (20)

Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Discover the Dark Web .pdf InfosecTrain
Discover the Dark Web .pdf  InfosecTrainDiscover the Dark Web .pdf  InfosecTrain
Discover the Dark Web .pdf InfosecTrain
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Essential Safety precautions during monsoon season
Essential Safety precautions during monsoon seasonEssential Safety precautions during monsoon season
Essential Safety precautions during monsoon season
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
factors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxfactors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptx
 

5.1 Provide a brief definition of network access control.5.2.docx

  • 1. 5.1 Provide a brief definition of network access control. 5.2 What is an EAP? 5.3 List and briefly define four EAP authentication methods. 5.4 What is EAPOL? 5.5 What is the function of IEEE 802.1X? 5.6 Define cloud computing. 5.7 List and briefly define three cloud service models. 5.8 What is the cloud computing reference architecture? 5.9 Describe some of the main cloud-specific security threats. 6.2 What protocols comprise TLS? 6.3 What is the difference between a TLS connection and a TLS session? 6.4 List and briefly define the parameters that define a TLS session state. 6.5 List and briefly define the parameters that define a TLS session connection. 6.6 What services are provided by the TLS Record Protocol?
  • 2. 6.7 What steps are involved in the TLS Record Protocol transmission? 6.8 What is the purpose of HTTPS? 6.9 For what applications is SSH useful? 6.10 List and briefly define the SSH protocols. 7.1 What is the basic building block of an 802.11 WLAN? 7.2 Define an extended service set. 7.3 List and briefly define IEEE 802.11 services. 7.4 Is a distribution system a wireless network? 7.5 How is the concept of an association related to that of mobility? 7.6 What security areas are addressed by IEEE 802.11i? 7.7 Briefly describe the five IEEE 802.11i phases of operation. 7.8 What is the difference between TKIP and CCMP? 8.1 What is the difference between RFC 5321 and RFC 5322? 8.2 What are the SMTP and MIME standards? 8.3 What is the difference between a MIME content type and a MIME transfer encoding?
  • 3. 8.4 Briefly explain base64 encoding. 8.5 Why is base64 conversion useful for an e-mail application? 8.6 What is S/MIME? 8.7 What are the four principal services provided by S/MIME? 8.8 What is the utility of a detached signature? 8.9 What is DKIM? 9.1 Give examples of applications of IPsec. 9.2 What services are provided by IPsec? 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA? 9.4 What is the difference between transport mode and tunnel mode? 9.5 What is a replay attack? 9.6 Why does ESP include a padding field? 9.7 What are the basic approaches to bundling SAs? 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?