1) describe what is/are Round Robin Protocols? What is the most popular example of round-robin?
2) Describe the basic features of public-key cryptography, Advanced Encryption Standard, digital signatures, and the public key infrastructure.
3) Describe the techniques used to secure wireless communications and
List the advantages to the business of having a security policy?