Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Which
of the following processes is used by remote users to make a secure connection to internal resources
after establishing an Internet connection?

Which
of the following processes is used by remote users to make a secure connection to internal resources
after establishing an Internet connection?

A.
Spoofing

B.
Packet sniffing

C.
Tunneling

D.
Packet filtering

Explanation:
Tunneling is a process used by remote users to make a secure connection to internal
resources after establishing an Internet connection. The
tunnel is created between the two ends by encapsulating the data in a mutually agreed-upon
protocol for transmission.
Answer option D is incorrect. Packet filtering is a method that allows or restricts the flow of specific
types of packets to provide security. It
analyzes the incoming and outgoing packets and lets them pass or stops them at a network interface
based on the source and destination
addresses, ports, or protocols. Packet filtering provides a way to define precisely which type of IP
traffic is allowed to cross the firewall of an
intranet. IP packet filtering is important when users from private intranets connect to public
networks, such as the Internet.
Answer option B is incorrect. Packet sniffing is a process of monitoring data packets that travel
across a network. The software used for
packet sniffing is known as sniffers. There are many packet-sniffing programs that are available on
the Internet. Some of these are
unauthorized, which can be harmful for a network’s security.
Answer option A is incorrect. Spoofing is a technique that makes a transmission appear to have
come from an authentic source by forging the
IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using
someone else’s IP address to hide his
identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because
forging the source IP address causes the
responses to be misdirected.



Leave a Reply 0

Your email address will not be published. Required fields are marked *