Sensitive or critical for business or military purposes

Assignment Help Basic Computer Science
Reference no: EM132603086

Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted. What does encrypted data look like? In this lab we will look at data which is unencrypted and data that is encrypted. We will use a tool called GNS3 to simulate two routers that are connected via a point-to-point link. We will run data through this link while looking at the packets going through it. The tool we will use to view the data is Wireshark which is probably the most important tool we as network engineers have in our toolbelt. Let's answer the following questions as we go through the lab.

1. What is the cleartext data that is being sent in the ping between the two PCs? _____________________

2. What is the protocol used for the ping utility? ____________________

3. How many ping messages do you see? _____________________ Why?

4. Is this data encrypted or unencrypted? _____________________________

5. Now let's make a change in the router. What types of messages do you see now? Does it look the same as the messages we saw before we made the change to the router? ________________________

6. What protocol do you see now? ____________________

7. Are you still able to see the source and destination MAC address? __________What layer is this you are looking at the MAC address in? _____________

8. Are you still able to see the source and destination IP address? __________What layer is this you are looking at the IP address in? _____________

9. Can you see the cleartext data you saw before? ____________________________

10. Explain the ESP protocol. Does what we see in Wireshark make sense? Write a paragraph answering these two questions.

Reference no: EM132603086

Questions Cloud

Describe the health care organization or network : Research a health care organization or network that spans several states with in the United States (United Healthcare, Vanguard, Banner Health, etc.).
Why do managers often end up satisficing : Why do managers often end up "satisficing" when seeking solutions to problems? Discuss at least two examples of satisficing.
Describe the role of IoT in case : Describe the role of IoT in this case. What makes IBM Watson a necessity in this case? Check IBM cognitive buildings. How do they relate to this case?
Explain why spirituality has emerged as a popular choice : List the major ways that religion in the late 20th/ early 21st Century U.S. has evolved. Explain why Spirituality has emerged as a popular choice of belief
Sensitive or critical for business or military purposes : Any data that is sensitive or critical for business or military purposes should be encrypted. But what does it mean to be encrypted.
Define importance of health policy for health administrators : In your own words, explain the significance of health policy for health administrators and why it is important to stay up-to-date on policy trends and debates.
Identify and briefly explain anti-competitive possibilities : Identify and briefly explain the anti-competitive possibilities inherent in Net marketplaces. Initial post 250 and respond to two other student
What are the price and rate variances of direct materials : Assume that the quantity of direct materials purchased, What are the price and rate variances of direct materials and direct labour respectively?
Identify the various stakeholders in health policymaking : What is the role of the private sector in policymaking? Identify the various stakeholders in health policymaking. Why is it important to seek input from all.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Changes encourage an appropriate increase

Explain the process of how the Fed changes interest rates and how those changes encourage an appropriate increase or decrease in spending in the economy?

  Can the expansion test and reduction test both successful

Can the expansion test and the reduction test both be successful? Prove your answer.

  Analyze during the planning phase of negotiation

Discuss what a salesperson should review and analyze during the planning phase of negotiation? How does a typical salesperson obtain the knowledge needed to become a successful salesperson?

  Which of two alternatives you should pursue

The WBS identifies all of the work that must be done to complete the project

  Create events and event handling methods

Create events and event handling methods that provide the user with controls to make the ninja jump , duck, jab, and kick.

  Knudstorp align with the changes in business strategy

How did the information systems and the organization design changes implemented by Knudstorp align with the changes in business strategy?

  Write a program to fetch the state and marital status

Write a program to fetch the state and marital status of five users? If user is from CA, NV, AR, V count them towards the western region

  Will gort approach work

Will Gort's approach work? How much more of a gamble is Gort taking than any project manager normally takes? What should Gort watch out for?

  Estimating the per-person certification error rate

How many households should be included in your sample so that the half width of a 95% Cl for estimating the per-person certification error rate is less.

  Describe some real-world scenarios

After exploring the chart and graphic features, describe some real-world scenarios when you or an organization might consider using them.

  Implement bleeding edge technology

Does every IT department implement bleeding edge technology, wait until technology has been tested by others in the vertical

  Identify one network security strategy

Identify one network security strategy that would help this organization. Why did you choose this strategy over others?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd