Save
Saving
  • R
    Razmik Artonian 0

    Can you please explain to me the difference between reverting to a known state and Rollback to known configuration? (in an Operating System). I am assuming that both of them will take the OS back to an earlier time when the problem did not exist but which one of them will preserver recently created user files? How about a recently created user account?

    posted in Security read more
  • R
    Razmik Artonian 0

    Can you please explain to me the difference between a cryptographic function (typical cryptographic function from a software library) and a Crypto Module ?

    posted in Security read more
  • R
    Razmik Artonian 0

    Lets say we are given the following info:
    A site-to-site VPN connection using IPsec Tunnel with both AH and ESP enabled to provide authentication and Encryption respectively.
    Looking at the info provided to us can you tell which encryption algorithm is being used? I mean , since IPsec is not an encryption algorithm in itself.

    posted in Security read more
  • R
    Razmik Artonian 0

    I know this might not be the smartest question but I am trying to understand the concept or the theory.

    WPA uses TKIP for encryption protocol. WPA-2 uses CCMP for encryption protocol.
    IPsec is used to encrypt IP traffic or data in transit.
    How can WPA-2 use two encryption protocols simultaneously (CCMP and IPsec) ?
    The same question could be asked about WPA in relation to TKIP and IPsec.

    posted in Security read more
  • R
    Razmik Artonian 0

    I know we can use 802.1x (RADIUS ) for Wireless user authentication with Access Points.
    But can we use VPN for wireless encryption? If so , will we be using IPSEC ?

    posted in Security read more
  • R
    Razmik Artonian 0

    I know SFTP is FTP over SSH and FTPS is FTP over SSL/TLS.
    When do we use SFTP and when do we use FTPS?
    Could you please compare/contrast SFTP and FTPS ?

    posted in Security read more
  • R
    Razmik Artonian 0

    Lets say , I have a DMZ located between Firewall number one facing the Internet and the Firewall number 2 facing the Intranet. I want to add a proxy server (if possible to evaluate two different scenarios of forward proxy and reverse proxy) to this configuration, where should the proxy server be added?

    posted in Security read more
  • R
    Razmik Artonian 0

    While experimenting with CryptoDemo 1.0, I realized that there are different encrypted data outcomes for the same plain text with the same algorithm (3DES) and the same key.
    So does that mean that there are infinite number of Crypto texts which could be decrypted to arrive at the same plain text? (assuming same 3DES algorithm and same key)

    posted in Security read more
  • R
    Razmik Artonian 0

    Can you please explain the difference between "PEAP" and "EAP-TTLS" ?It seems both use TLS tunnel to protect wireless communication. And both require a certificate on the 802.1x server but not for the client.

    posted in Security read more
  • R
    Razmik Artonian 0

    Can someone please explain to me the concept of Perfect Forward Secrecy?

    posted in Security read more