IPsec authentication header provides which of the following?

A. Connectionless data integrity
B. Data authentication
C. Protection against replay attacks
D. All the above


Answer: D
Explanation: Authentication header (AH) modifies IP datagrams by adding an attribute field, which enables receivers to check the authenticity of the data. It supports connectionless data integrity, data authentication, and protection against replay attacks.

Computer Science & Information Technology

You might also like to view...

The strategy that is used to break a problem down into smaller pieces that can be more easily handled is called:

a. Code reuse b. Divide and conquer c. Inheritance d. Parameter e. None of these

Computer Science & Information Technology

Which statement is true regarding the CInt function?

a. It converts letters to numbers. b. It cannot convert a string such as "24.7" to an integer. c. A floating-point number such as 24.7 is converted to 24, dropping its decimal positions. d. A floating-point number such as 24.7 is converted to 25, rounding its decimal positions.

Computer Science & Information Technology

The style margin: 10px 4px; sets top and bottom margins equally to 5px, and left and right margins equally to 2px.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Buffer overflow attacks are one of the most common attacks seen. 2. Buffer overflow exploits are no longer a major source of concern to security practitioners. 3. A buffer overflow error is not likely to lead to eventual program termination. 4. To exploit any type of buffer overflow the attacker needs to identify a buffer overflow vulnerability in some program that can be triggered using externally sourced data under the attackers control. 5. At the basic machine level, all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor’s registers or in memory.

Computer Science & Information Technology