Chapter 11 Quiz

Question:

The chapter discusses five cross-layer modules. What does it mean to be cross layer? Name and briefly describe the 2 of these modules. (Based on Logan)

Answer:

Quiz Solution

Discussion:

  1. The book stays that IPv6 does not support fragmentation and reassembly, what are the implications of this?
  2. The reading mentions Gray Hole Deletion attacks. How is it possible to guard against such an attack, or even to find it when it happens?
  3. How many of the methods described in the book are currently in use? Are they universal or just good practice that is rarely fully implemented?
  4. In talking about what order to apply the encryption information and forgery detection tags, the book says you can do either one first or both simultaneously (giving SSH as an example). That doesn’t seem possible to me.
  5. What layer is the most vital?
  6. How do you defend against eavesdropping?
  7. The book stays that IPv6 does not support fragmentation and reassembly, what are the implications of this?
  8. The reading mentions Gray Hole Deletion attacks. How is it possible to guard against such an attack, or even to find it when it happens?
Topic revision: r3 - 2014-03-10 - JimSkon
 
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback