PrepAway - Latest Free Exam Questions & Answers

Which of the following protocols will you use to manage the communication securely?

You work as a Network Administrator for uCertify Inc. You need to provide a secure communication between the server and the client computers of the company. Which of the following protocols will you use to manage the communication securely?

PrepAway - Latest Free Exam Questions & Answers

A.
HTTP

B.
TCP

C.
TLS

D.
SSL

Explanation:
The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet’s Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL is included as part of both the Microsoft and Netscape browsers and most Web server products. URLs that require an SSL connection start with https: instead of http: Transport Layer Security (TLS) is a cryptographic protocol that provides security and data integrity for communications over networks such as the Internet. TLS and SSL encrypt the segments of network connections at the Transport Layer end-to-end. Several versions of the protocols are in wide-spread use in applications like web browsing, electronic mail, Internet faxing, instant messaging, and voice-over-IP (VoIP). The TLS
protocol, an application layer protocol, allows client/server applications to communicate across a network in a way designed to prevent eavesdropping, tampering, and messageforgery. TLS provides endpoint authentication and communications confidentiality over the Internet using cryptography. Answer option A is incorrect. Hypertext Transfer Protocol (HTTP) is a client/server TCP/IP protocol used on the World Wide Web (WWW) to display Hypertext Markup Language (HTML) pages. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when a client application or browser sends a request to the server using HTTP commands, the server responds with a message containing the protocol version, success or failure code, server information, and body content, depending on the request. HTTP uses TCP port 80 as the default port. Answer option A is incorrect. Hypertext Transfer Protocol (HTTP) is a client/server TCP/IP protocol used on the World Wide Web (WWW) to display Hypertext Markup Language (HTML) pages.
HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when a client application or browser sends a request to the server using HTTP commands, the server responds with a message containing the protocol version, success or failure code, server information, and body content, depending on the request. HTTP uses TCP port 80 as the default port. Answer option B is incorrect. Transmission Control Protocol (TCP) is a reliable, connection-oriented protocol operating at the transport layer of the OSI model. It provides a reliable packet delivery service encapsulated within the Internet Protocol (IP). TCP guarantees the delivery of packets, ensures proper sequencing of data, and provides a checksum feature that validates both the packet header and its data for accuracy. If the network corrupts or loses a TCP packet during transmission, TCP is responsible for retransmitting the faulty packet. It can transmit large amounts of datA.Application-layer protocols, such as HTTP and FTP, utilize the services of TCP to transfer files between clients and servers. Reference:http://en.wikipediA.org/wiki/Cryptographic_protocolAdam, a malicious hacker, gets paid to destroy the network system of Umbrella Inc. He decided to launch an attack that would result in serious financial losses. Meanwhile, Andy, an administrator at Umbrella Inc., realized that their main financial transaction server had been attacked. As a result of the attack, the server crashed and Andy needed to reboot the system, as no one was able to access the resources of the company. This process involves human interaction to fix it.


Leave a Reply