Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP-ISSAP All Questions

View all questions & answers for the CISSP-ISSAP exam

Exam CISSP-ISSAP topic 1 question 4 discussion

Actual exam question from ISC's CISSP-ISSAP
Question #: 4
Topic #: 1
[All CISSP-ISSAP Questions]

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

  • A. IP Security (IPSec)
  • B. Microsoft Point-to-Point Encryption (MPPE)
  • C. Pretty Good Privacy (PGP)
  • D. Data Encryption Standard (DES)
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
n00r1
10 months, 1 week ago
ChatGPT B. Microsoft Point-to-Point Encryption (MPPE) Explanation: Layer 2 Tunneling Protocol (L2TP) is often used in conjunction with Microsoft Point-to-Point Encryption (MPPE) for creating secure virtual private network (VPN) connections. MPPE is a protocol that provides encryption for the data sent over the L2TP connection, ensuring the confidentiality and security of the communication. This is a trick question. Layer 2 is the key word. IPSec is layer 3.
upvoted 1 times
...
74gjd_37
1 year, 1 month ago
Selected Answer: A
A. IPSec
upvoted 1 times
...
74gjd_37
1 year, 1 month ago
A. IPSec Peter will use IP Security (IPSec) to accomplish the task because IPSec provides a framework for securing IP communications and ensuring confidentiality, integrity, and authenticity of data transmitted across a public network. It offers encryption capabilities that can be used to encrypt data sent through the Internet. By implementing IPSec with L2TP, Peter can establish secure tunneling for remote users connecting to the private network of Net World Inc., thereby protecting sensitive information from unauthorized access or interception.
upvoted 1 times
74gjd_37
1 year, 1 month ago
PSec can be well integrated with L2TP to provide a secure solution for remote user access. In fact, the combination of L2TP and IPSec is commonly used together to create Virtual Private Network (VPN) connections. L2TP establishes the tunnel between the remote user's device and the private network over which data will be transmitted. It creates a virtual connection encapsulated within IP packets. IPSec, on the other hand, provides encryption and authentication for these IP packets transmitted through the public network. It adds an extra layer of security by encrypting the payload of each packet using cryptographic algorithms. By combining L2TP with IPSec, Peter can ensure that all communications between remote users' devices and Net World Inc.'s private network are protected from eavesdropping or tampering. The use of IPSec enhances confidentiality, integrity, and authenticity while leveraging L2TP for tunneling purposes.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...