You work as a Network Administrator for NetTech Inc. You want to have secure communication on the company's intranet. You decide to use public key and private key pairs. What will you implement to accomplish this?
Which of the following protocols uses public-key cryptography to authenticate the remote computer?
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?
In your office, you are building a new wireless network that contains Windows 2003 servers. To establish a network for secure communication, you have to implement IPSec security policy on the servers. What authentication methods can you use for this implementation? Each correct answer represents a complete solution. Choose all that apply.
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?