Why is IPsec considered a transparent protocol?

What will be an ideal response?


Because it operates at a low level in the OSI model, IPsec is considered a transparent security protocol. It is transparent to the following entities:
* Applications-Programs do not have to be modified to run under IPsec.
* Users-Unlike some security tools, users do not need to be trained on specific security procedures (such as encrypting with PGP).
* Software-Because IPsec is implemented in a device such as a firewall or router, no software changes must be made on the local client.

Computer Science & Information Technology

You might also like to view...

Ada could have been developed where the details of mytype are specified in the package body and not the package specification. If so ______ of the executing program would have been affected.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____________________ is an application error that occurs when more data is sent to a buffer than it can handle.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What happens if you drag a clip from the Source Monitor into the Program Monitor?

What will be an ideal response?

Computer Science & Information Technology

You can customize the desktop to show or hide the familiar ____________________ of Computer, Network, Recycle Bin, or Control Panel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology