Describe a type of network encryption that you use personally. Explain how the key distribution takes place. Describe the types of information protected. The next few problems ask about the networking topology portrayed in Figure 14.30. We have two eavesdroppers: Eve and Kevin. The gateways provide cryptographic protection.
• Gateway A provides WPA2 crypto protection.
• Gateways B and C provide IPsec crypto protection for traffic between Site 1 and Site 2. They provide no crypto protection between other Internet destinations.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here