Describe how encryption is implemented at various layers of the OSI model.

What will be an ideal response?


Encryption can happen at different layers of the OSI model using different methods, techniques, and technologies, as follows:
Layer 1: No common encryption at this layer. Layer 2: Proprietary encryption devices. Layer 3: IP Security (IPSec) protocol. Layer 4: No built-in encryption methods for TCP or UDP. Layers 5 and 6: Not common layers for encryption. Layer 7: Many different applications and protocols use different encryption methods. Examples include SSL/TLS, SSH.

Computer Science & Information Technology

You might also like to view...

To display the current date in a report you can add an unbound text box control and enter ____.

A. =Today() B. =Now() C. =Clock() D. =Date&Time()

Computer Science & Information Technology

Critical Thinking QuestionsIntegration Case 1Tim is a designer who, until recently, had not been involved with creating animations. His new client, however, wants him to make extensive use of animation on their company website, and Tim is trying to familiarize himself with the relevant features to make this a reality. Tim wants to use some existing options for animation to cause an object to move in a specific way. Which of the following menus on the Animation panel has options for Tim to use, rather than requiring him to reinvent the wheel?

A. Options menu B. Preset menu C. Template menu D. Existing Animations menu

Computer Science & Information Technology

When you save a presentation as a PDF file, each slide becomes a page in the PDF file by default.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The order of operations that Microsoft Excel follows is division, multiplication, exponentiation, and addition.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology