Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?
used to protect sessionless datagram protocols. SKIP works at Layer 3 of the OSI model. It integrates with the IPSec (Internet Protocol
Security).
Answer option D is incorrect. SLIP (Serial Line Internet Protocol) is an encapsulation of the Internet Protocol designed to work over serial
ports and modem connections. It is documented in RFC 1055. SLIP modifies a standard TCP/IP datagram by appending a special 'SLIP END'
character to it, which distinguishes datagram boundaries in the byte stream. SLIP requires a serial port configuration of 8 data bits, no parity,
and either EIA hardware flow control, or CLOCAL mode (3-wire null-modem) UART operation settings.
SLIP does not provide error detection, being reliant on upper layer protocols for this. Therefore, SLIP on its own is not satisfactory over an
error-prone dial-up connection. It is, however, still useful for testing operating systems' response capabilities under load. SLIP is also currently
used in the BlueCore Serial Protocol for communication between Bluetooth modules and host computers.
Answer option A is incorrect. SWIPE (Software IP Encryption) is a Layer 3 protocol that provides authentication, integrity, and confidentiality.
Answer option B is incorrect. S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of e-
mail encapsulated in MIME. S/MIME provides the following cryptographic security services for electronic messaging applications: authentication,
message integrity, non-repudiation of origin (using digital signatures), privacy, and data security (using encryption).
Currently there are no comments in this discussion, be the first to comment!