The __________ protocol provides system-to-system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.

A. ESP
B. AH
C. HA
D. SEP


Answer: B

Computer Science & Information Technology

You might also like to view...

A database administrator uses the ____ option to open the database prior to setting a password or database security.

A. Open Read-Only B. Open Exclusive C. Open D. Open Exclusive Read-Only

Computer Science & Information Technology

What are the differences between ACCDB and ACCDE files?

What will be an ideal response?

Computer Science & Information Technology

You would use the ________ to temporarily hold selections that you have cut or copied.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____________________ is a security-analysis methodology that can be used to identify risks and to guide subsequent software development decisions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology