Computer Sciences > GATE 2014 SET-2 > Network Security
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3.
Q-R1-R2-R3-H
H acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer encryption is used, with DES as the shared key encryption protocol. Consider the following four pieces of information:
[I1] The URL of the file downloaded by Q
[I2] The TCP port numbers at Q and H
[I3] The IP addresses of Q and H
[I4] The link layer addresses of Q and H
Which of I1, I2, I3, and I4 can an intruder learn through sniffing at R2 alone?
Q-R1-R2-R3-H
H acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer encryption is used, with DES as the shared key encryption protocol. Consider the following four pieces of information:
[I1] The URL of the file downloaded by Q
[I2] The TCP port numbers at Q and H
[I3] The IP addresses of Q and H
[I4] The link layer addresses of Q and H
Which of I1, I2, I3, and I4 can an intruder learn through sniffing at R2 alone?
Correct : c
Similar Questions
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violati...
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violati...
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario, one or more of the following security violati...
Total Unique Visitors
Loading......