For the encryption methods and protocols listed below, identify the ones used fo
ID: 3727691 • Letter: F
Question
For the encryption methods and protocols listed below, identify the ones used for: web browser traffic, email, wireless network traffic, and data using a symmetric key.
TKIP
SSL
S/MIME
DES
WEP
WPA
PGP
S-HTTP
WPA2
3DES
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
- web browser traffic
-wireless network traffic
-data using a symmetric key
Explanation / Answer
TKIP - Temporal Key Integrity Protocol for wireless protocol
SSL - Secure socket layer - Web browser
S/MIME - Secure/Multipurpose Internet Mail Extensions - Emails
DES - data using a symmetric key
WEP - Wired Equivalent Privacy - Wireless network
WPA - Wi fi Protected Access - Wireless network
PGP - Pretty Good Privacy - emails
S-HTTP - Secure HTTP - Web browser
WPA2 - Wi fi Protected Access 2 - Wireless network
3DES - data using a symmetric key