Welcome to Westonci.ca, your ultimate destination for finding answers to a wide range of questions from experts. Discover comprehensive solutions to your questions from a wide network of experts on our user-friendly platform. Explore comprehensive solutions to your questions from knowledgeable professionals across various fields on our platform.

XYZ University wants to set up a VPN network to connect to the internet and ensure that all their data is safe. They have asked you to recommend the correct communication protocol to use. Which of the following protocols should you recommend and why?
a. HTTPS, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.
b. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.
c. TLS, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network.
d. SSH, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network.
Answer: b. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.


Sagot :

The correct answer is option B:

b. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.

What is IPsec?

Several protocols collectively known as IPsec are used to establish secure connections between devices. It contributes to the security of data transmitted over open networks. It works by encrypting IP packets and authenticating the source from which the packets originate. IPsec is frequently used to set up VPNs.

Internet Protocol and secure are both abbreviated as IP and sec, respectively, in the term "IPsec." The main routing protocol used on the Internet is called the Internet Protocol, and it uses IP addresses to specify where data will go. Authentication and encryption are added to this process by IPsec, making it more secure.

Learn more about IPsec

https://brainly.com/question/17299146

#SPJ1

We appreciate your time on our site. Don't hesitate to return whenever you have more questions or need further clarification. Thanks for stopping by. We strive to provide the best answers for all your questions. See you again soon. Westonci.ca is here to provide the answers you seek. Return often for more expert solutions.