Which of the following user authentications are supported by the SSH - 1 protocol but not by the SSH -
2 protocol?
Each correct answer represents a complete solution. Choose all that apply.
Question No 2
Adam wants to encrypt an email message with an asymmetric key encryption scheme, so that he can
send it to his friend Andy. Which of the following is the requirement to encrypt the email, so that
only Andy can read it?
Question No 3
Which of the following firewalls inspects the actual contents of packets?
Question No 4
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
Question No 5
Place the encryption algorithms in their respective categories.
Answer:
Explanation:
The following are symmetric encryption algorithms:
DES
RC5
AES
Blowfish