Question
1) What is a DoS attack and how does it differ from a DDoS attack? How can one launch a DoS attack? List at least
1) What is a DoS attack and how does it differ from a DDoS attack? How can one launch a DoS attack? List at least 2 methods. What can be done to prevent DDOS and DOS attacks?
2) What is the key difference between symmetric and asymmetric encryption? Why should keys be exchanged out of band in symmetric encryption? In both symmetric and asymmetric encryption, there are some drawbacks that can be addressed by a hybrid method such as Diffie-Hellman; what are these drawbacks?
4) What are the 6 components of PKI? How does PKI protect information assets? What is the average "key" size of a strong encryption system in use today? What is the standard for encryption currently recommended by NIST?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started