Answered You can hire a professional tutor to get the answer.

QUESTION

Please answer below questions in one line each. no plagiarism, can copy but use own words to avoid plagiarism.  1. Summarize the key functional components of the Internet mail architecture. 2. Explain

Please answer below questions in one line each. no plagiarism, can copy but use own words to avoid plagiarism. 

1. Summarize the key functional components of the Internet mail architecture.

2. Explain the basic functionality of   SMTP, POP3, and IMAP.

3. Explain the need for MIME as an   enhancement to ordinary e-mail.

4. Describe the key elements of MIME.

5. Understand the functionality of   S/MIME and the security threats it addresses.

6. Understand the basic mechanisms of   STARTTLS and its role in e-mail security.

7. Understand the basic mechanisms of   DANE and its role in e-mail security.

8. Understand the basic mechanisms of   SPF and its role in e-mail security.

9. Understand the basic mechanisms of   DKIM and its role in e-mail security.

10. Understand the basic mechanisms of   DMARC and its role in e-mail security

11. Present an overview of IP security   (IPsec).

12. Explain the difference between   transport mode and tunnel mode.

13. Understand the concept of security   association.

14. Explain the difference between the   security association database and the security policy database.

15. Summarize the traffic processing   functions performed by IPsec for outbound packets and for inbound packets.

16. Present an overview of   Encapsulating Security Payload.

17. Discuss the alternatives for   combining security associations.

18. Present an overview of Internet Key   Exchange.

19. Summarize the alternative   cryptographic suites approved for use with IPsec.

20. What are three broad mechanisms   that malware can use to propagate?

21. What are four broad categories of payloads   that malware may carry?

22. What are typical phases of   operation of a virus or worm?

23. What mechanisms can a virus use to   conceal itself?

24. What is the difference between   machine-executable and macro viruses?

25. What means can a worm use to access   remote systems to propagate?

26. What is a “drive-by-download” and   how does it differ from a worm?

27. What is a “logic bomb”?

28. Differentiate among the following:   a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be   present in the same malware?

29. List some of the different levels   in a system that a rootkit may use.

30. Describe some malware   countermeasure elements.

31. List three places malware   mitigation mechanisms may be located.

32. Briefly describe the four   generations of antivirus software.

33. How does behavior-blocking software   work?

34. What is a distributed   denial-of-service system?

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question