Short Answer Questions
1. Describe the steps involved if George sends an encrypted and authenticated email message to Cosmo.
2. What are the three primary goals of information security? Provide a definition of each.
3. You have been assigned a Class A address (11.0.0.0) and must create 5 subnets. Answer the following questions.
a. What is the default subnet mask of the address space you were given?
b. How many bits will you need to borrow to create 5 subnets?
c. What is the new subnet mask?
d. How many valid host addresses can be assigned in each subnet?
e. Complete the following table
4. What is a virtual private network? Describe the process that occurs when making a VPN connection.
3. Describe T-Carrier and SONET dedicated WAN solutions. Provide an example of each and the corresponding speed of the example you used. List two topologies that are used with dedicated WAN services?