Which of the following protocols provide confidentiality to the data messages (payloads) by ways of encryption?
a. ESP
b. SHA-1
c. DES
d. AES
a. ESP
Explanation: ESP provides confidentiality to the data messages (payloads) by ways of encryption. It uses symmetrical encryption algorithms such as Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), and Advanced Encryption Standard (AES).
You might also like to view...
MC A(n)________in a SELECT query indicates that all columns from a specified database table should be selected.
a) hyphen. b) asterisk. c) ALL keyword. d) None of the above.
Email messages are stored in a(n) ____________________ file, also known as a .pst file.
Fill in the blank(s) with the appropriate word(s).
Which of these is not a guideline for developing a prototype?
A) Build the system slowly and carefully. B) Modify the prototype. C) Stress the user interface. D) Work in manageable modules.
Using the table given in problem 17 and using a sequential search routine, how many attempts will the search routine make to find the number 28.
a. Can't be done b. one attempt c. two attempts d. three attempts e. None of the above.