Your organization needs to access resources on a legacy network that implemented a non-routable network protocol. Which of the following means is most feasible? (Wentz QOTD)
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
My suggested answer is D. Proxy.
Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams and an informative reference for security professionals.
A legacy network implies network technologies seldom implemented nowadays, such as 10Base2, 10Base5, Token Ring, Token Bus, etc. A non-routable protocol implies the network layer, which deals with addressing and routing issues, or higher layers. Messages encapsulated by a non-routable protocol, e.g., NetBEUI, cannot be routed to other networks because the protocol considers the host address only but without the network address.
- A proxy can sit above the network layer and serve as a protocol translator.
- A bridge can connect two networks that use the same or incompatible frame formats at the data link layer, but it doesn’t process routing, an issue at the network layer.
- A router is not working in this scenario because the target network is non-routable.
- VPN typically uses protocols above the data link layer to establish a tunnel to provide data link layer services, which doesn’t address the non-routable protocol. Moreover, few VPN solutions support connecting to legacy networks.
您的組織需要存取實施了不可路由(non-routable)的網路協議的舊網絡上的資源。 以下哪個方法是最可行？ (Wentz QOTD)