The __________ protocol provides system-to-system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.
A. ESP
B. AH
C. HA
D. SEP
Answer: B
Computer Science & Information Technology
You might also like to view...
A database administrator uses the ____ option to open the database prior to setting a password or database security.
A. Open Read-Only B. Open Exclusive C. Open D. Open Exclusive Read-Only
Computer Science & Information Technology
What are the differences between ACCDB and ACCDE files?
What will be an ideal response?
Computer Science & Information Technology
You would use the ________ to temporarily hold selections that you have cut or copied.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
____________________ is a security-analysis methodology that can be used to identify risks and to guide subsequent software development decisions.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology