ISC Exam Questions

How does the SOCKS protocol secure Internet Protocol (IP) connections?

How does the SOCKS protocol secure Internet Protocol (IP) connections?

A.
By negotiating encryption keys during the connection setup.

B.
By attaching Authentication Headers (AH) to each packet.

C.
By distributing encryption keys to SOCKS enabled applications.

D.
By acting as a connection proxy.

Explanation:
“SOCKS is an example of a circuit-level proxy gateway that provides a secure channel between two
computers. When a SOCKS-enabled client sends a request to a computer on the Internet, this
request actually goes to the network’s SOCKS proxy server…” pg 379 Shon Harris: All-in-One CISSP
Certification