PrepAway - Latest Free Exam Questions & Answers

Which of the following protocols are required by the robust security network (RSN) for providing robust securi

Which of the following protocols are required by the robust security network (RSN) for providing robust security?
Each correct answer represents a complete solution. Choose all that apply.

PrepAway - Latest Free Exam Questions & Answers

A.
IPSec

B.
CCMP/AES

C.
IEEE 802.1X

D.
SSL

Explanation:
CCMP (Cipher Block Chaining Message Authentication Code Protocol) is the encryption method defined by the robust security network (RSN). It uses the advanced encryption standard (AES) algorithm for providing robust security.
The robust security network (RSN) also requires the use of IEEE 802.1X for providing robust security. IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. IEEE 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP). 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server.
Answer option A is incorrect. Internet Protocol Security (IPSec) is a standard-based protocol that provides the highest level of VPN security.
IPSec can encrypt virtually everything above the networking layer. It is used for VPN connections that use the L2TP protocol. It secures both data and password. IPSec cannot be used with Point-to-Point Tunneling Protocol (PPTP). Answer option D is incorrect. The Secure Sockets Layer virtual private network (SSL VPN) is a kind of VPN that runs on Secure Socket Layers technology and is accessible via https over web browsers. It permits users to establish safe and secure remote access sessions from virtually any Internet connected browser. SSL functions between the Transmission Control Protocol (TCP) layer and Application Layer protocols.
Traditional VPN requires the installation of IPsec client software on a client machine before a connection is established, whereas SSL VPN has no such requirement. Corporate users are able to access confidential applications or shared files on standard web browsers. The main benefit of SSL VPN technology is that because it is user-based, not device-based, any authorized user can login from web-enabled PCs for secure,
remote access of confidential files. The safety issues are similar to SSL-based credit card online transactions.

One Comment on “Which of the following protocols are required by the robust security network (RSN) for providing robust securi


Leave a Reply