Link to home
Start Free TrialLog in
Avatar of lukegriffiths110
lukegriffiths110

asked on

Past exam questions (network trace)

Please answerv the following questions:-

http://www.dkeirle.com/images/etheral.jpg

a) The screen shot shown in figure Q4 (see link) depicts a trace of network activity of a web based connection to the University e-mail service. Discuss whether you think this is a secure method of accessing messages, through consideration of the trace.

......

b) Part of the trace shows a Change Cipher Spec activity taking place.    Discuss this and describe what you think further analysis would show if the “Client Hello” information was analysed.

......

c) Discuss the “Server Hello” and subsequent operations, including the contents of the “Application Data”.

......



ASKER CERTIFIED SOLUTION
Avatar of kevinf40
kevinf40

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial