Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSAP Topic 6 Question 28 Discussion

Actual exam question for ISC2's Information Systems Security Architecture Professional exam
Question #: 28
Topic #: 6
[All Information Systems Security Architecture Professional Questions]

Which of the following protocols should a Chief Security Officer configure in the network of his company to protect sessionless datagram protocols?

Show Suggested Answer Hide Answer
Suggested Answer: C

used to protect sessionless datagram protocols. SKIP works at Layer 3 of the OSI model. It integrates with the IPSec (Internet Protocol

Security).

Answer option D is incorrect. SLIP (Serial Line Internet Protocol) is an encapsulation of the Internet Protocol designed to work over serial

ports and modem connections. It is documented in RFC 1055. SLIP modifies a standard TCP/IP datagram by appending a special 'SLIP END'

character to it, which distinguishes datagram boundaries in the byte stream. SLIP requires a serial port configuration of 8 data bits, no parity,

and either EIA hardware flow control, or CLOCAL mode (3-wire null-modem) UART operation settings.

SLIP does not provide error detection, being reliant on upper layer protocols for this. Therefore, SLIP on its own is not satisfactory over an

error-prone dial-up connection. It is, however, still useful for testing operating systems' response capabilities under load. SLIP is also currently

used in the BlueCore Serial Protocol for communication between Bluetooth modules and host computers.

Answer option A is incorrect. SWIPE (Software IP Encryption) is a Layer 3 protocol that provides authentication, integrity, and confidentiality.

Answer option B is incorrect. S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of e-

mail encapsulated in MIME. S/MIME provides the following cryptographic security services for electronic messaging applications: authentication,

message integrity, non-repudiation of origin (using digital signatures), privacy, and data security (using encryption).


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel