Week 5, Week 6 and week 7

Week 5 5.1 Provide a illiberal limitation of network vestibule coerce. 5.2 What is an EAP? 5.3 List and illiberally explain foul-mouthed EAP verification methods. 5.4 What is EAPOL? 5.5 What is the part of IEEE 802.1X? 5.6 Explain shade computing. 5.7 List and illiberally explain three shade benefit models. 5.8 What is the shade computing regard construction? 5.9 Illustrate some of the ocean shade-specific guarantee threats. Week 6 6.2 What protocols contain TLS? 6.3 What is the distinction betwixt a TLS union and a TLS meeting? 6.4 List and illiberally explain the parameters that explain a TLS meeting avow. 6.5 List and illiberally explain the parameters that explain a TLS meeting union. 6.6 What benefits are granted by the TLS Record Protocol? 6.7 What steps are confused in the TLS Record Protocol transmission? 6.8 What is the object of HTTPS? 6.9 For what applications is SSH beneficial? 6.10 List and illiberally explain the SSH protocols. Week 7  7.1 What is the basic fabric obstruct of an 802.11 WLAN? 7.2 Explain an distant benefit set. 7.3 List and illiberally explain IEEE 802.11 benefits. 7.4 Is a division order a wireless network? 7.5 How is the concept of an union cognate to that of disturbance? 7.6 What guarantee areas are addressed by IEEE 802.11i? 7.7 Little illustrate the five IEEE 802.11i phases of production. 7.8 What is the distinction betwixt TKIP and CCMP? Submit a Microsoft Word muniment underneathneath the Homework 5 Submission amalgamate.