Describe how encryption is implemented at various layers of the OSI model.
What will be an ideal response?
The process of encryption varies dramatically depending on what you want to encrypt. Encryption can happen at different layers of the OSI model as follows:
• Layer 1 No common encryption is done at this layer, until you get to some of the bigger WAN technologies, like SONET.
• Layer 2 No common encryption is done at this layer.
• Layer 3 Only one common protocol encrypts at Layer 3: IPsec. IPsec is typically implemented via software that encrypts the IP packet. A new outer packet completely encapsulates and encrypts the inner packet.
• Layer 4 Neither TCP nor UDP offers any encryption methods, so nothing happens security-wise at Layer 4.
• Layers 5, 6, and 7 Important encryption standards (such as SSL and TLS used in e-commerce) happen within these layers, but don't fit cleanly into the OSI model.
You might also like to view...
calculate y component double Vect :: ycomponent( Vect ) const
What will be an ideal response?
Data stored in Plain Text contains:
A) no capital letters; all text is converted to lower case. B) no formatting, such as bold or italics. C) all capital letters; all text is converted to upper case. D) no punctuation, such as commas or periods.
In a table, pressing Enter moves the insertion point to the next cell in the same row
Indicate whether the statement is true or false
Which of the following is NOT controlled by choosing a chart style?
A) Sparklines B) Data series C) Color of the chart area D) Plot area