Assignment – Encryption and Authentication Methods
Objectives
Understand encryption and authentication methods
Describe encryption and authentication methods
Contrast among encryption and authentication
Questions
Synthesize major characters of each protocol into the table below.
Using the given information as a hint and fill up those missing fields under Type, Primary Use(s), and
Notes columns. Except for the Notes column, you can get the hints from the information given for the three columns.
For the column, Notes, you need to provide a summary for each security method. Refer to the TLS row. It says that TLS provides a secure transmission of HTTP sessions.
Security Method
Type
Primary Use(s)
Notes
IPsec
Encryption
TCP/IP transmissions
SSL
TCP/IP transmissions
TLS
Secure transmission of HTTP sessions
PPP
Connection
Remote Access
SSH
Connection, Authentication, Encryption
RDP
VNC
L2TP
Tunneling
VPN
GRE
VPN
OpenVPN
IKEv2
VTP
Trunking
SHA
Hashing
Data Integrity
LDAP
Authentication
Directory Access
Kerberos
Client validation
Verify the identity of clients and securely exchange information after a client logs on a system
RADIUS
Central authentication point for network users, including wireless, mobile, and remote users
TACACS+
AAA (Authentication, Authorization, and Accounting)
Client validation and monitoring
EAP
Client verification
802.1X
AES
Wi-Fi and other uses
Hint
Utilize those given hints in the table to answer those missing ones.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount