1. Which security protocols are used to protect e-mail?
2. IPSec can be used in two modes. What are they?
3. Which kind of attack on cryptosystems involves using a collection of pre-identified terms? Which kind of attack involves sequential guessing of all possible key combinations?