IP Security Protocol:

a. is focused on Web applications
b. is primarily used to encrypt e-mail
c. is a policy which makes public key encryption work on the Internet
d. sits between IP at the network layer and TCP/UDP at the transport layer
e. operates in entrapment mode


Ans: d. sits between IP at the network layer and TCP/UDP at the transport layer

Computer Science & Information Technology

You might also like to view...

What are the benefits of using macros?

What will be an ideal response?

Computer Science & Information Technology

PDF, which stand for ________, is a standard format for documents on the Web

Fill in the blank(s) with correct word

Computer Science & Information Technology

In a filename, the base name is the _____.

A. combined contents of the file B. file extension assigned by the app C. label the user assigns D. description the app adds when saving

Computer Science & Information Technology

Identifiers declared within a class have .

a) block scope b) class scope c) local scope d) None of the above.

Computer Science & Information Technology