A financial institution notices repeated data leaks. Investigations confirm that sensitive information is exposed while traveling across the network. Administrators decide to adopt a cryptographic approach that preserves data secrecy and supports validation at the addressing layer while retaining existing routing solutions. Which method addresses their concern?
Enabling basic credentials without extra protection
Applying MD5 verification for transported data
Implementing an IP-based extension that provides encryption with authentication
Building a proprietary hash program before sending data
An IP-based security approach works by applying encryption as well as authentication, preventing unauthorized access to data and verifying the source. MD5 checksums, while they spot tampering, do not conceal the content. Basic authentication is prone to credential disclosure. A custom hashing script, while offering integrity checks, is not a complete solution when data moves between systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an IP-based extension for encryption and authentication?
Open an interactive chat with Bash
Why is MD5 insufficient for secure data transmission?
Open an interactive chat with Bash
What is the difference between authentication and encryption?