Chapter Review Questions

The following questions reinforce the concepts that were covered in this chapter.

1. How long, in bits, is the DES key?

2. True or False: In 3DES, the same key is used to encrypt at each of the three stages.

3. Define a hash in your own words.

4. What is used to create a digital signature?

5. Define authentication and provide an example.

6. Define authorization and provide an example.

7. A hash check occurs at what point in the operation of MD5?

8. Of the security protocols covered in this chapter, which of them use generic routing encapsulation (GRE)?

9. Describe several security benefits of L2TP.

10. What are the three core SSH capabilities?

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.