57.8k views
4 votes
True or false questions. If a statement is false, you must explain the reason why it is false: a). Suppose that TCP is being run over IPsec with the AH protocol. If TCP retransmits the same packet, then the two packets will have the same sequence number in the AH header. b). Suppose certifier.com creates a certificate for foo.com. Typically the entire certificate would be encrypted with certifier.com's public key.

2 Answers

3 votes

Answer:

Step-by-step explanation:

The TCP protocol uses the OPTIONS field to exchange information like maximum segment size accepted between the TCP layers on the two hosts. The flags currently defined are

• URG Urgent pointer field is valid

• ACK Acknowledgement field is valid

• PSH This segment requests a push

• RST Reset the connection

• SYN Synchronize sequence numbers

• FIN Sender has reached end of its byte stream

OFFSET

This integer indicates the offset of the user data within the segment. This field is only required as the number of bits used in the OPTIONS field can vary

URGENT POINTER

This field can be initialized to point to a place in the user data where urgent information such as escape codes etc. are placed. Then the receiving host can process this part immediately when it receives the segment.

TCP/IP (or rather; the TCP/IP protocol suite) is not limited to the TCP and IP protocols, but consist of a multitude of interrelated protocols that occupy the upper three layers of the ARPA model. With the exception of the Point-to-Point Protocol (PPP) which resides in the upper half of the Network Interface Layer, the TCP/IP suite generally does not include the Network Interface layer, but merely depends on it for access to the medium.

The Network Interface layer

The Network Interface layer is responsible for transporting frames between hosts on the same physical network. It is implemented in the Network Interface Card or NIC, using hardware and firmware (i.e. software resident in Read Only Memory).

The NIC employs the appropriate medium access control methodology, such as CSMA/CA, CMSA/CD, token passing or polling, and is responsible for placing the data received from the upper layers within a frame before transmitting it. The frame format is dependent on the system being used, for example Ethernet or Frame Relay, and holds the hardware address of the source and destination hosts as well as a checksum for data integrity.

User Allen
by
5.1k points
3 votes

Answer:

a. True

b. False

Explanation:

b. False

At the initial stage, the certificate needs to be encrypted not by the public key of certifier.com but by the by the private key of certifier.com.

After which, the certificate which contains lots information, (i.e there's more information in the certificate than just the public key to be certified). The certificate also the CA’s information, the certificate expiration date, etc.

Only this information’s digital fingerprint is encrypted by the certifier.com’s private key.

User Vyacheslav Cotruta
by
6.0k points