14). List the four main protocols that function within InternetProtocol Security.<br/>15). Describe the three types of ACL access models: mandatory,discretionary, and role-based.<br/>16). Desceibe how encryption is implemented at various layersof
<br/><img src="https://media.cheggcdn.com/media%2F0b7%2F0b71212b-b98f-4136-9078-a92e3dcb11f7%2Fimage" alt="What needs to be submitted: . Two.c programs - one containing the implementation with signal system call and another with the POSIX signal systenm calls such as sigaction
<p>In this assessment, you will design and code a simple Javaapplication that defines a class, instantiate the class into anumber of objects, and prints out the attributes of these objectsin