Solutions for Chapter 16 - Cryptography and Network Security - Stallings - 6th edition

Review Questions

16.1 Provide a brief definition of network access control.
Get 16.1 exercise solution

16.2 What is an EAP?
Get 16.2 exercise solution

16.3 List and briefly define four EAP authentication methods.
Get 16.3 exercise solution

16.4 What is EAPOL?
Get 16.4 exercise solution

16.5 What is the function of IEEE 802.1X?
Get 16.5 exercise solution

16.6 Define cloud computing.
Get 16.6 exercise solution

16.7 List and briefly define three cloud service models.
Get 16.7 exercise solution

16.8 What is the cloud computing reference architecture?
Get 16.8 exercise solution

16.9 Describe some of the main cloud-specific security threats.
Get 16.9 exercise solution


Problems

16.2 Figure 16.3 suggests that EAP can be described in the context of a four-layer model. Indicate the functions and formats of each of the four layers. You may need to refer to RFC 3748.
Get 16.2 exercise solution