{"id":55178,"date":"2024-04-16T00:22:58","date_gmt":"2024-04-16T00:22:58","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=55178"},"modified":"2024-04-16T00:22:58","modified_gmt":"2024-04-16T00:22:58","slug":"which-of-the-following-is-not-a-correct-way-to-secure-communication-layer","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/","title":{"rendered":"Which of the following is not a correct way to secure communication layer"},"content":{"rendered":"<p>[amp_mcq option1=&#8221;cloud initiated communication&#8221; option2=&#8221;tls\/ssl&#8221; option3=&#8221;ips(intrusion prevention system)&#8221; option4=&#8221;firewalls&#8221; correct=&#8221;option1&#8243;]<!--more--><\/p>\n<p>The correct answer is A. Cloud initiated communication.<\/p>\n<p>Cloud initiated communication is not a correct way to secure communication layer because it is not a security measure. It is a way to deliver content to users, but it does not provide any protection against unauthorized access or malicious attacks.<\/p>\n<p>TLS\/SSL, IPS, and firewalls are all security measures that can be used to secure communication layers. TLS\/SSL is a cryptographic protocol that provides end-to-end security for data transmitted over a network. IPS is a system that monitors network traffic for suspicious activity and blocks it if necessary. Firewalls are devices that control access to a computer or network.<\/p>\n<p>Cloud initiated communication is a way to deliver content to users. It does not provide any protection against unauthorized access or malicious attacks. Therefore, it is not a correct way to secure communication layer.<\/p>\n<p>TLS\/SSL is a cryptographic protocol that provides end-to-end security for data transmitted over a network. It is used to secure communication between web browsers and web servers, as well as between other applications that need to communicate securely. TLS\/SSL works by encrypting the data that is transmitted over the network. This makes it difficult for anyone who intercepts the data to read it.<\/p>\n<p>IPS is a system that monitors network traffic for suspicious activity and blocks it if necessary. IPS systems can be used to protect against a variety of attacks, including denial-of-service attacks, SQL injection attacks, and cross-site scripting attacks.<\/p>\n<p>Firewalls are devices that control access to a computer or network. They can be used to block unauthorized access to a computer or network, as well as to filter traffic that is allowed to pass through the firewall. Firewalls can be either software-based or hardware-based.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[amp_mcq option1=&#8221;cloud initiated communication&#8221; option2=&#8221;tls\/ssl&#8221; option3=&#8221;ips(intrusion prevention system)&#8221; option4=&#8221;firewalls&#8221; correct=&#8221;option1&#8243;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[728],"tags":[],"class_list":["post-55178","post","type-post","status-publish","format-standard","hentry","category-cloud-computing","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Which of the following is not a correct way to secure communication layer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which of the following is not a correct way to secure communication layer\" \/>\n<meta property=\"og:description\" content=\"[amp_mcq option1=&#8221;cloud initiated communication&#8221; option2=&#8221;tls\/ssl&#8221; option3=&#8221;ips(intrusion prevention system)&#8221; option4=&#8221;firewalls&#8221; correct=&#8221;option1&#8243;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-16T00:22:58+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Which of the following is not a correct way to secure communication layer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/","og_locale":"en_US","og_type":"article","og_title":"Which of the following is not a correct way to secure communication layer","og_description":"[amp_mcq option1=&#8221;cloud initiated communication&#8221; option2=&#8221;tls\/ssl&#8221; option3=&#8221;ips(intrusion prevention system)&#8221; option4=&#8221;firewalls&#8221; correct=&#8221;option1&#8243;]","og_url":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2024-04-16T00:22:58+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/","url":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/","name":"Which of the following is not a correct way to secure communication layer","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2024-04-16T00:22:58+00:00","dateModified":"2024-04-16T00:22:58+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/which-of-the-following-is-not-a-correct-way-to-secure-communication-layer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"mcq","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/"},{"@type":"ListItem","position":3,"name":"Cloud computing","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/mcq\/cloud-computing\/"},{"@type":"ListItem","position":4,"name":"Which of the following is not a correct way to secure communication layer"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/55178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=55178"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/55178\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=55178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=55178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=55178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}