The research department for your company needs carry out a Web conference with a third party. The manager of the research department has requested that you ensure that the Web conference is encrypted because of the sensitive nature of the topic that will be discussed. Which of the following should you deploy?
A. SSL
B. SET
C. IPsec
D. RC4
D
Explanation: RC4 is a stream-based cipher and could be used to encrypt Web conference traffic.
Secure Sockets Layer (SSL) is used to encrypt financial or other confidential data that is transmitted over HTTP. It cannot be used to encrypt Web conference traffic.
Secure Electronics Transfer (SET) is used to protect financial data. Internet Protocol Security (IPsec) is used to protect data transmitted over a Virtual Private Network (VPN).
You might also like to view...
A network interface card has the MAC address 00-00-86-15-7A. From this information, specify the OUI.
a. There is not sufficient information to specify the OUI. b. The OUI is 86-15-7A. c. The OUI is 86-00-00. d. The OUI is 00-00-86.
An administrator is assigning custom permissions to a user who will back up a system. Using the principle of least permissions, which of the following permissions is needed by the user to perform this task?
a. Modify b. Read & Execute c. Write d. List Folder Contents
You ?can select the table data by clicking the upper-right corner of the first table cell. ____________________
Answer the following statement true (T) or false (F)
What icon might you see in Device Manager that indicates a problem with a device?
A. blue circle B. yellow triangle C. red square D. white oval