Explain why deep packet inspection cannot be performed on protocols such as SSL and SSH

What will be an ideal response?


The payloads of the packets are encrypted with a secret key shared by the client
and server but not known to the firewall.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Using the [i] on a string variable does not check for illegal values of i. 2. A string variable and a c-string are the same data type. 3. The function used to 'put two c-strings together into one" is called 4. The following declares a c-string and initializes it to "speaker" char str[]="speaker"; 5. The following declares a c-string variable that will hold 10 letters. char str[10];

Computer Science & Information Technology

A model often used when creating a program that begins with the overall task and refines it into smaller subtasks is a(n)

a. flowchart b. UML diagram c. blueprint d. hierarchy chart e. None of these

Computer Science & Information Technology

Exchange enables employees to be more productive by effectively ____.

A. creating databases B. designing websites C. managing email across multiple devices D. facilitating teamwork

Computer Science & Information Technology

________ is a EU-sponsored standards organization that produces globally applicable standards for information and communications technologies.

A) ODCA B) ITU-T C) ETSI D) ONF

Computer Science & Information Technology