Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

Which of the following is a security protocol that is used to protect data from being modified,
corrupted, or accessed without authorization?

Which of the following is a security protocol that is used to protect data from being modified,
corrupted, or accessed without authorization?

A.
Honeypot

B.
IP Security (IPsec)

C.
DNSSEC

D.
Protocol spoofing

Explanation:
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a data stream. IPsec also
includes protocols for establishing mutual authentication between agents at the beginning of the
session and negotiation of cryptographic keys to be used during the session. IPsec can be used to
protect data flows between a pair of hosts, between a pair of security gateways, or between a
security gateway and a host.
Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the
Domain Name System (DNS) as used on Internet Protocol (IP) networks. It is a set of extensions to
DNS which provide to DNS clients origin authentication of DNS data, authenticated denial of
existence, and data integrity, but not availability or confidentiality.
attackers. It is for this reason that a honey pot has low security permissions. A honey pot is used to
gain information about the intruders and their attack strategies.
performance in situations where an currently working protocol is inadequate. In a computer security
context, it refers to several forms of falsification of technically unrelated data.



Leave a Reply 1

Your email address will not be published. Required fields are marked *