Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please disregar Number 5, that answer is wrong. In TLS, the the client or server

ID: 3918178 • Letter: P

Question

Please disregar Number 5, that answer is wrong.

In TLS, the the client or server protocol protects confidentiality and integrity of the data sent between client and server while the protocol authenticates QUESTION 5 Which of the following statements about log analysis is not true? OLog analysis is made easier because there is a standard format for logging data structures across operating systems ? In addition to helping to figure out what happened in the past, log analysis can also help plan future changes to the network. O Log analysis is made harder because the data of interest to the network analyst may be buried under irrelevant information from many applications Log analysis can help identify anomalies in the network. QUESTION 6 Which of the following is true? The Encapsulated Security Protocol (ESP) provides source authentication, data integrity, and confidentiality. O The Encapsulation Security Protocol (ESP) provides source authentication and data integrity, but not confidentiality The Authentication Header protocol (AH) provides source authentication, data integrity, and confidentiality. O The Authentication Header protocol (AH) provides source authentication and confidentiality, but not data integrity

Explanation / Answer

Answer:

In TLS, the Encapsulation Security Payload (ESP) protocol protects confidentiality and integrity of the data sent between client and server while the Authentication Header (AH) protocol authenticates the client or server.

Question 5

Option C is the Answer

Question 6

Encapsulation Security Payload (ESP) provides Authentication, data integrity, and confidentiality but Authentication Header (AH) provides only authentication.

So, option A is correct.