How does IPSec verify that data arrived at the destination without intentional or accidental corruption?
A. By using a randomized hashing operation
B. With the use of a compression technology
C. By exchanging symmetric keys
D. Through the use of public key encryption
Answer: A. By using a randomized hashing operation
You might also like to view...
5. What is displayed by the following program after the call to execl?
#include
The most common way of doing risk management is ____.
A. formal B. informal C. ad-hoc D. semi-structured
Before VLAN was an IEEE standard, early implementations depended on the switch vendor and on a method known as ____________________.
Fill in the blank(s) with the appropriate word(s).
A(n) ____________________ control is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer.
Fill in the blank(s) with the appropriate word(s).