Which of the following is not a correct way to secure communication layer

cloud initiated communication
tls/ssl
ips(intrusion prevention system)
firewalls

The correct answer is A. Cloud initiated communication.

Cloud initiated communication is not a correct way to secure communication layer because it is not a security measure. It is a way to deliver content to users, but it does not provide any protection against unauthorized access or malicious attacks.

TLS/SSL, IPS, and firewalls are all security measures that can be used to secure communication layers. TLS/SSL is a cryptographic protocol that provides end-to-end security for data transmitted over a network. IPS is a system that monitors network traffic for suspicious activity and blocks it if necessary. Firewalls are devices that control access to a computer or network.

Cloud initiated communication is a way to deliver content to users. It does not provide any protection against unauthorized access or malicious attacks. Therefore, it is not a correct way to secure communication layer.

TLS/SSL is a cryptographic protocol that provides end-to-end security for data transmitted over a network. It is used to secure communication between web browsers and web servers, as well as between other applications that need to communicate securely. TLS/SSL works by encrypting the data that is transmitted over the network. This makes it difficult for anyone who intercepts the data to read it.

IPS is a system that monitors network traffic for suspicious activity and blocks it if necessary. IPS systems can be used to protect against a variety of attacks, including denial-of-service attacks, SQL injection attacks, and cross-site scripting attacks.

Firewalls are devices that control access to

74.6 75.5c-23.5 6.3-42 24.9-48.3 48.6-11.4 42.9-11.4 132.3-11.4 132.3s0 89.4 11.4 132.3c6.3 23.7 24.8 41.5 48.3 47.8C117.2 448 288 448 288 448s170.8 0 213.4-11.5c23.5-6.3 42-24.2 48.3-47.8 11.4-42.9 11.4-132.3 11.4-132.3s0-89.4-11.4-132.3zm-317.5 213.5V175.2l142.7 81.2-142.7 81.2z"/> Subscribe on YouTube
a computer or network. They can be used to block unauthorized access to a computer or network, as well as to filter traffic that is allowed to pass through the firewall. Firewalls can be either software-based or hardware-based.