The research department for your company needs carry out a Web conference with a third party. The manager of the research department has requested that you ensure that the Web conference is encrypted because of the sensitive nature of the topic that will be discussed. Which of the following should you deploy?

A. SSL
B. SET
C. IPsec
D. RC4


D
Explanation: RC4 is a stream-based cipher and could be used to encrypt Web conference traffic.
Secure Sockets Layer (SSL) is used to encrypt financial or other confidential data that is transmitted over HTTP. It cannot be used to encrypt Web conference traffic.
Secure Electronics Transfer (SET) is used to protect financial data. Internet Protocol Security (IPsec) is used to protect data transmitted over a Virtual Private Network (VPN).

Computer Science & Information Technology

You might also like to view...

A network interface card has the MAC address 00-00-86-15-7A. From this information, specify the OUI.

a. There is not sufficient information to specify the OUI. b. The OUI is 86-15-7A. c. The OUI is 86-00-00. d. The OUI is 00-00-86.

Computer Science & Information Technology

An administrator is assigning custom permissions to a user who will back up a system. Using the principle of least permissions, which of the following permissions is needed by the user to perform this task?

a. Modify b. Read & Execute c. Write d. List Folder Contents

Computer Science & Information Technology

You ?can select the table data by clicking the upper-right corner of the first table cell. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What icon might you see in Device Manager that indicates a problem with a device?

A. blue circle B. yellow triangle C. red square D. white oval

Computer Science & Information Technology