The __________ mechanism assures that a received packet was in fact transmitted by the party identified as the source in the packet header and assures that the packet has not been altered in transit.

A) confidentiality
B) authentication
C) security
D) key management


D) key management

Computer Science & Information Technology

You might also like to view...

The Labels button is found in the ________ group on the Create tab

A) Forms B) Reports C) Queries D) Tables

Computer Science & Information Technology

The Word feature that determines whether the next word in the line will fit within the established right margin is called:

A) margin check. B) wrapping. C) wrap text. D) wordwrap.

Computer Science & Information Technology

Which antivirus technique compares the beginning and end of executable files against a list of known virus signatures?

a. Signature scanning b. Heuristic scanning c. Integrity checking d. Activity blocking

Computer Science & Information Technology

Which of the following Debian Package Management commands will install the newest versions of all packages that are currently installed on a system?

A. apt-get update B. apt-get update-all C. apt-get upgrade D. apt-get upgrade all

Computer Science & Information Technology