Which of the following protocols should a Chief Security Officer configure in the network…?

Which
of the following protocols should a Chief Security Officer configure in the network of his company to
protect sessionless datagram protocols?

Which
of the following protocols should a Chief Security Officer configure in the network of his company to
protect sessionless datagram protocols?

A.
SWIPE

B.
S/MIME

C.
SKIP

D.
SLIP

Explanation:
SKIP (Simple Key-Management for Internet Protocol) is developed by the IETF Security
Working Group for the sharing of encryption keys. It is
used to protect sessionless datagram protocols. SKIP works at Layer 3 of the OSI model. It integrates
with the IPSec (Internet Protocol
Security).
Answer option D is incorrect. SLIP (Serial Line Internet Protocol) is an encapsulation of the Internet
Protocol designed to work over serial
ports and modem connections. It is documented in RFC 1055. SLIP modifies a standard TCP/IP
datagram by appending a special “SLIP END”
character to it, which distinguishes datagram boundaries in the byte stream. SLIP requires a serial
port configuration of 8 data bits, no parity,
and either EIA hardware flow control, or CLOCAL mode (3-wire null-modem) UART operation
settings.
SLIP does not provide error detection, being reliant on upper layer protocols for this. Therefore, SLIP
on its own is not satisfactory over an
error-prone dial-up connection. It is, however, still useful for testing operating systems’ response
capabilities under load. SLIP is also currently
used in the BlueCore Serial Protocol for communication between Bluetooth modules and host
computers.
Answer option A is incorrect. SWIPE (Software IP Encryption) is a Layer 3 protocol that provides
authentication, integrity, and confidentiality.
Answer option B is incorrect. S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard
for public key encryption and signing of email encapsulated in MIME. S/MIME provides the following cryptographic security services for
electronic messaging applications: authentication,
message integrity, non-repudiation of origin (using digital signatures), privacy, and data security
(using encryption).



Leave a Reply 0

Your email address will not be published. Required fields are marked *