COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following process is used in IPSEC to negotiate symmetric keys securely between endpoints over an unsecure intermediate media?
|
Diffie-Hellman Key Exchange
|
|
Advanced Encryption Standard (AES)
|
|
Secure Hashing Algorithm (SHA)
|
|
RSA
|
Explanation:
Detailed explanation-1: -A VPN uses tunneling protocols to encrypt data at the sending end and decrypts it at the receiving end. The originating and receiving network addresses are also encrypted to provide better security for online activities. VPN apps are often used to protect data transmissions on mobile devices.
Detailed explanation-2: -The correct answer is Virtual Private Network. Key PointsVirtual Private Network. VPN stands for Virtual Private Network. Hence, Option 3 is correct. It is an encrypted connection over the Internet from a device to a network.
There is 1 question to complete.