Answer the following questions QUESTION 1. 1. List ways in which secret keys can be distributed to
Question:
Answer the following questions
QUESTION 1.
1. List ways in which secret keys can be distributed to two communicating parties.
2. What is the difference between a session key and a master key?
3. What is a key distribution center?
4. What entities constitute a full-service Kerberos environment?
5. In the context of Kerberos, what is a realm?
6. What are the principal differences between version 4 and version 5 of Kerberos?
7. What is a nonce?
8. What are two different uses of public-key cryptography related to key distribution?
9. What are the essential ingredients of a public-key directory?
10. What is a public-key certificate?
11. What are the requirements for the use of a public-key certificate scheme?
12. What is the purpose of the X.509 standard?
13. What is a chain of certificates?
14. How is an X.509 certificate revoked?
QUESTION 2
1. Provide a brief definition of network access control.
2. What is an EAP?
3. List and briefly define four EAP authentication methods.
4. What is EAPOL?
5. What is the function of IEEE 802.1X?
6. Define cloud computing.
7. List and briefly define three cloud service models.
8. What is the cloud computing reference architecture?
9. Describe some of the main cloud-specific security threats.
Cost management a strategic approach
ISBN: 978-0073526942
5th edition
Authors: Edward J. Blocher, David E. Stout, Gary Cokins