1. When a VPN uses IP-in-IP tunneling, what prevents an attacker from reading the header of the original datagram?
2. Read about vulnerabilities in the WEP protocol. How does the WPA protocol avoid the problems?
3. List eight security technologies used in the Internet, and describe the purpose of each.
4. Give an example of a protocol mechanism that hides an error
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here