A financial institution notices repeated data leaks. Investigations confirm that sensitive information is exposed while traveling across the network. Administrators decide to adopt a cryptographic approach that preserves data secrecy and supports validation at the addressing layer while retaining existing routing solutions. Which method addresses their concern?
Implementing an IP-based extension that provides encryption with authentication
Enabling basic credentials without extra protection
Applying MD5 verification for transported data
Building a proprietary hash program before sending data
An IP-based security approach works by applying encryption as well as authentication, preventing unauthorized access to data and verifying the source. MD5 checksums, while they spot tampering, do not conceal the content. Basic authentication is prone to credential disclosure. A custom hashing script, while offering integrity checks, is not a complete solution when data moves between systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the IP-based extension that provides encryption with authentication?
Open an interactive chat with Bash
What is the limitation of using MD5 for securing data during transport?
Open an interactive chat with Bash
Why is basic authentication without extra protection not secure?