Question: 1 . Stella and George are using Public Key encryption. Stella s public and private keys are named S - Pub and S - Priv.
Stella and George are using Public Key encryption. Stellas public and private keys are named SPub and SPriv. Georges public and private keys are named GPub and GPriv.
a points Assume George is sending encrypted data to Stella. Which key of the key names above does George use to encrypt the data? Which key does Stella use to decrypt the data?
b points Assume Stella is adding a digital signature to her messages to George to prove her identity. Which key of the key names above does Stella use to encrypt the Message Authentication Code MAC that she sends? Which key does George use to decrypt the MAC that he receives?
points You are choosing between SEAL and AES for symmetric encryption to ensure confidentiality on a Gbps data session. Describe SEAL and AES. Name one advantage to choosing SEAL as compared with AES.
Look at the Cluster of ASA Firewalls network diagram on slide of the FWArchitectures slides Week These firewalls share an Inside Virtual IP and an Outside Virtual IP address. All inside hosts will use this Inside Virtual IP as their default gateway.
a points What is a First Hop Redundancy Protocol FHRP Explain how the firewalls can share one Virtual IP using an FHRP
b points Name one reason that a network manager might prefer to use GLBP rather than HSRP as the FHRP for this cluster.
c points If this cluster uses ActiveActive redundancy, then what is the maximum number of ASA firewalls that can simultaneously be processing packet traffic for new TCP connections or Explain your answer.
points In the IPSEC Framework, the four Confidentiality algorithm options DESDES, AES or SEAL are all privatekey symmetric encryption algorithms. There are no publickey asymmetric encryption algorithms such as RSA in this list. Why does the IPSEC Framework not allow the use of any publickey encryption algorithm for Confidentiality?
points The IPSEC AH protocol does not encrypt the packet data. However, an RSA encryption key is often required for an AH security association SA to be established. What is the purpose of this RSA key, given that the SA packet data is not being encrypted?
points In which IPSEC ESP mode is the original IP header sent before the ESP header is sent? Possible answers: a Transport mode only b Tunnel mode only c both Transport mode and Tunnel mode.
points What is an Identity NAT rule? Explain why you often need to configure an Identity NAT rule when you set up an IPSEC VPN on a Cisco ASA firewall that is using NAT.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
