PrepAway - Latest Free Exam Questions & Answers

What would you call the process that takes advantages o…

What would you call the process that takes advantages of the security provided by a transmission protocol by
carrying one protocol over another?

PrepAway - Latest Free Exam Questions & Answers

A.
Piggy Backing

B.
Steganography

C.
Tunneling

D.
Concealing

Explanation:
A tunneling protocol allows a network user to access or provide a network service that the underlying network
does not support or provide directly. Because tunneling involves repackaging the traffic data into a different
form, perhaps with encryption as standard, one use of tunneling is to hide the nature of the traffic that is run
through the tunnels.
Incorrect Answers:
A: Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using
another subscriber’s wireless Internet access service without the subscriber’s explicit permission or knowledge.
B: Steganography uses files, not protocols. Steganography is the practice of concealing a file, message, image,
or video within another file, message, image, or video.
D: One protocol carrying another is called tunneling, not concealing.

Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, New York, 2013, p. 702


Leave a Reply