COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Hashing functions like MD5 and SHA are used in IPSEC to provide which of the following services:
A
Data confidentiality (privacy from eavesdropping)
B
Data Integrity (data protected from being changed during transit)
C
Securely negotiating a key over a un-secure media
D
Anti replay protection
Explanation: 

Detailed explanation-1: -A VPN uses tunneling protocols to encrypt data at the sending end and decrypts it at the receiving end. The originating and receiving network addresses are also encrypted to provide better security for online activities. VPN apps are often used to protect data transmissions on mobile devices.

Detailed explanation-2: -The encrypted connection helps ensure that sensitive data is safely transmitted. A VPN extends a corporate network through encrypted connections made over the Internet. Because the traffic is encrypted between the device and the network, traffic remains private as it travels.

Detailed explanation-3: -Explanation: Site-to-site VPNs are also known as Router-to-router VPNs which are typically used in companies and firms for connecting remotely different branches with different geographical locations.

There is 1 question to complete.