Encrypting Traffic on a Leased Line | Cisco 200-125 Exam Question Answer

Which of the following encrypts the traffic on a leased line?

Prev Question Next Question

Question

Which of the following encrypts the traffic on a leased line?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

B

The correct answer is D. VPN (Virtual Private Network).

A leased line is a dedicated point-to-point connection between two locations, which is typically used by organizations to transmit data between their sites. While leased lines are private and secure by design, they do not provide any encryption of the traffic that flows through them.

To address this limitation, organizations can use a VPN to encrypt the traffic that flows over the leased line. A VPN is a secure and private communication tunnel that is established over a public network, such as the Internet. By encrypting the traffic that flows through the VPN, organizations can ensure that their data remains private and secure.

Option A, Telnet, is a protocol used for remote access to network devices. It does not encrypt traffic, making it vulnerable to eavesdropping and other types of attacks.

Option B, SSH (Secure Shell), is a protocol used for remote access to network devices that encrypts traffic. However, SSH is not used to encrypt traffic on leased lines.

Option C, VTP (VLAN Trunking Protocol), is a protocol used to manage VLANs (Virtual LANs) in a network. It does not provide any encryption capabilities.

Option E, DM VPN (Dynamic Multipoint VPN), is a type of VPN that is used to connect multiple sites in a network. While DM VPN provides encryption capabilities, it is not typically used to encrypt traffic on a leased line.