Answer: filters packets travelling from and to the intranet from the internet
Answer: filters packets travelling from and to the intranet from the internet
Answer: routers which connect intranet to internet
Answer: security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
(i) Protecting an organization’s data resource from unauthorized access
(ii)Preventing disasters from happening
(iii) Authenticating messages received by an organization
(iv) Protecting messages sent on the internet from being read and understood by unauthorized persons/organizations
Answer: i, iii, iv
Answer: defines several hundred transaction sets for various business forms
Answer: S/MIME is used
Answer: MIME to attach EDI forms to e-mail messages
Answer: can be done on internet
Answer: Performance degradation
Answer: more secure
Answer: one private key is used for both encryption and decryption
Answer: IAMAGENIUSZ
Answer: WFGHFFFIWGF
Answer: on any bit string
(i) protect business information from eavesdropping when it is transmitted on internet
(ii) efficiently use the bandwidth available in PSTN
(iii) to protect information stored in companies’ databases from retrieval
(iv) to preserve secrecy of information stored in databases if an unauthorized person retrieves it
Answer: i and iv
Answer: scrambling it to preserve its security
Answer: a software which runs on a special reserved computer on the intranet
(i) has a proxy application gateway program running on it
(ii)Allows specified internet users to access specified services in the intranet
(iii) Initiates all internet activities requested by clients and monitors them
(iv) prevents outsiders from accessing IP addresses within the intranet
Answer: i, ii, iii, iv
(i) acts on behalf of all intranet users wanting to access internet securely
(ii)monitors all accesses to internet and allows access to only specified IP addresses
(iii) disallows use of certain protocols with security problems
(iv) disallows all internet users from accessing intranet
Answer: i, ii, iii
Answer: to allow intranet users to securely use specified internet services