problem1. What do you understand by the term Firewall?
problem2. Supposing, that as a network engineer, you are supposed to execute a firewall, how would you go on to select the right firewall for organisation?
problem3. Illustrate the differentiations between Host-based IDS and Network Hosed IDS?
problem4. How the IP Security Architecture Supports Multicast?
problem5. describe, in details, Link-Link Encryption and End-End Encryption.
problem6. Internet Key Exchange operates in two phases. Briefly describe the two phases?
problem7. Illustrate, in details, what you understand by ISAKMP?
problem8. Illustrate the process of Kerberos Ticket Exchange, using diagram to illustrate your answer?
problem9. Illustrate what you understand by symmetric encryption, public key encryption and hash functions.