Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?

Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?

A.
Packet filtering

B.
Tunneling

C.
Packet sniffing

D.
Spoofing

Explanation:

Tunneling is a process used by remote users to make a secure connection to internal resources after
establishing an Internet connection. The tunnel is created between the two ends by encapsulating
the data in a mutually agreed-upon protocol for transmission.
Answer option A is incorrect. Packet filtering is a method that allows or restricts the flow of specific
types of packets to provide security. It analyzes the incoming and outgoing packets and lets them
pass or stops them at a network interface based on the source and destination addresses, ports, or
protocols. Packet filtering provides a way to define precisely which type of IP traffic is allowed to
cross the firewall of an intranet. IP packet filtering is important when users from private intranets
connect to public networks, such as the Internet.
Answer option C is incorrect. Packet sniffing is a process of monitoring data packets that travel
across a network. The software used for packet sniffing is known as sniffers. There are many packetsniffing programs that are available on the Internet. Some of these are unauthorized, which can be
harmful for a network’s security.
Answer option D is incorrect. Spoofing is a technique that makes a transmission appear to have
come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing,
a hacker modifies packet headers by using someone else’s IP address to hide his identity. However,
spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source
IP address causes the responses to be misdirected.



Leave a Reply 0

Your email address will not be published. Required fields are marked *