Can link and end-to-end encryption both be used on the same communication? What would be the advantage of that? Cite a situation in which both forms of encryption might be desirable.

What will be an ideal response?

Yes. More sensitive communications might be protected with end-­?to-­?end encryption carried through a lower-­?sensitivity link encrypted pipe. Or a company might implement end-­?to-­?end encryption of email at the application level, without knowing that the pathway would be encrypted (e.g., not all paths would necessarily be link encrypted).

Computer Science & Information Technology

You might also like to view...

A smart card is a credit card-sized electronic device that stores ______________, thereby providing for secure, tamperproof identification and authentication

a. Public keys only b. Private keys only c. Public and private keys d. None of the above.

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 6-1James is setting up user accounts on his new computer. He would like to create several accounts with different privileges. Answer the questions James asks himself. James wants to set up another account that can be used by his friends when they are coming to his house and would like to check their e-mails or view the latest sport news. What type of user account should he set up?

A. non-standard user B. on-line user C. Guest D. Visitor

Computer Science & Information Technology