Question: 1) What is a DoS attack and how does it differ from a DDoS attack? How can one launch a DoS attack? List at least

1) What is a DoS attack and how does it differ from a DDoS attack? How can one launch a DoS attack? List at least 2 methods. What can be done to prevent DDOS and DOS attacks?

2) What is the key difference between symmetric and asymmetric encryption? Why should keys be exchanged out of band in symmetric encryption? In both symmetric and asymmetric encryption, there are some drawbacks that can be addressed by a hybrid method such as Diffie-Hellman; what are these drawbacks?

4) What are the 6 components of PKI? How does PKI protect information assets? What is the average "key" size of a strong encryption system in use today? What is the standard for encryption currently recommended by NIST?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!