PrepAway - Latest Free Exam Questions & Answers

Which of the following is a security protocol that is used to protect data from being modified, corrupted, or

Which of the following is a security protocol that is used to protect data from being modified,
corrupted, or accessed without authorization?

PrepAway - Latest Free Exam Questions & Answers

A.
Honeypot

B.
IP Security (IPsec)

C.
DNSSEC

D.
Protocol spoofing

Explanation:
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a data stream. IPsec also
includes protocols for establishing mutual authentication between agents at the beginning of the
session and negotiation of cryptographic keys to be used during the session. IPsec can be used to
protect data flows between a pair of hosts, between a pair of security gateways, or between a
security gateway and a host.

Answer C is incorrect. Domain Name System Security Extensions (DNSSEC) is a suite of Internet
Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the
Domain Name System (DNS) as used on Internet Protocol (IP) networks. It is a set of extensions to
DNS which provide to DNS clients origin authentication of DNS data, authenticated denial of
existence, and data integrity, but not availability or confidentiality.

Answer A is incorrect. A honey pot is a computer that is used to attract potential intruders or
attackers. It is for this reason that a honey pot has low security permissions. A honey pot is used to
gain information about the intruders and their attack strategies.

Answer D is incorrect. Protocol spoofing is used in data communications for enhancing the
performance in situations where an currently working protocol is inadequate. In a computer security
context, it refers to several forms of falsification of technically unrelated data.


Leave a Reply