Question 1
6.2 What protocols comprise TLS?
6.3 What is the difference between a TLS connection and a TLS session?
6.4 List and briefly define the parameters that define a TLS session state.
6.5 List and briefly define the parameters that define a TLS session connection.
6.6 What services are provided by the TLS Record Protocol?
6.7 What steps are involved in the TLS Record Protocol transmission?
6.8 What is the purpose of HTTPS?
6.9 For what applications is SSH useful?
6.10 List and briefly define the SSH protocols.
question 2
7.1 What is the basic building block of an 802.11 WLAN?
7.2 Define an extended service set.
7.3 List and briefly define IEEE 802.11 services.
7.4 Is a distribution system a wireless network?
7.5 How is the concept of an association related to that of mobility?
7.6 What security areas are addressed by IEEE 802.11i?
7.7 Briefly describe the five IEEE 802.11i phases of operation.
7.8 What is the difference between TKIP and CCMP?
Question 3
Summarize the key functional components of the Internet mail architecture.
Explain the basic functionality of SMTP, POP3, and IMAP.
Explain the need for MIME as an enhancement to ordinary e-mail.
Describe the key elements of MIME.
Understand the functionality of S/MIME and the security threats it addresses.
Understand the basic mechanisms of STARTTLS and its role in e-mail security.
Understand the basic mechanisms of DANE and its role in e-mail security.
Understand the basic mechanisms of SPF and its role in e-mail security.
Understand the basic mechanisms of DKIM and its role in e-mail security.
Understand the basic mechanisms of DMARC and its role in e-mail security.