lukegriffiths110
asked on
Past exam questions (network trace)
Please answerv the following questions:-
http://www.dkeirle.com/images/etheral.jpg
a) The screen shot shown in figure Q4 (see link) depicts a trace of network activity of a web based connection to the University e-mail service. Discuss whether you think this is a secure method of accessing messages, through consideration of the trace.
......
b) Part of the trace shows a Change Cipher Spec activity taking place. Discuss this and describe what you think further analysis would show if the “Client Hello” information was analysed.
......
c) Discuss the “Server Hello” and subsequent operations, including the contents of the “Application Data”.
......
http://www.dkeirle.com/images/etheral.jpg
a) The screen shot shown in figure Q4 (see link) depicts a trace of network activity of a web based connection to the University e-mail service. Discuss whether you think this is a secure method of accessing messages, through consideration of the trace.
......
b) Part of the trace shows a Change Cipher Spec activity taking place. Discuss this and describe what you think further analysis would show if the “Client Hello” information was analysed.
......
c) Discuss the “Server Hello” and subsequent operations, including the contents of the “Application Data”.
......
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.