Encapsulating Security Protocol

Encapsulating Security Protocol
(Real)

Part 1:

The alternative to Encapsulating Security Protocol (ESP) is __________________.
One of the main drawbacks of the File Transfer Protocol (FTP) is that ________________.
It was the first file transfer protocol invented in the IP suite
It does not encrypt content.
It does not encrypt passwords.
It is widely used by web sites.
Both b and c
An IPSec tunnel is step up in two stages. In the Information column of the Frame Summary, these steps are called _________.
The first phase of setting up an IPsec tunnel is called _______ _______.
The second phase of setting up an IPsec tunnel is called ________ _______.
SA stands for Security Association. An equivalent word would be _________
The protocol used for setting up the “administrative” tunnel in IPsec is __________.
ISAKMP stands for ________.
Internet Security Association and Key Management Protocol
Internet Secure Admission Key Management Protocol
Internet Security Association and Key Maintenance Protocol
Internet Secure Admission Key Maintenance Protocol
Internet Security Association and Key Management Provisioning
Part 2:

List five types of system information that can be obtained from the Windows Task Manager? How can you use this information to confirm the presence of malware on a system? (Hint: Look at the bandwidth and CPU utilization.)

Windows Task Manager and Windows Computer Manager both provide information about system services. Compare and contrast the types of information (about system services) that can be obtained from these tools.

Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file?

Should you filter log files during an investigation into a security incident? Why or why not?

Should remote desktop services be enabled on employee workstations for use by IT Help Desk personnel? Why or why not?

How does Microsoft Baseline Security Analyzer (MBSA) differ from Windows Update? Why are Shares a source of system vulnerabilities?

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

Click the button below to order this paper.

order-now-button-red
money_back

Leave a Reply

*