IP Security Protocol:
a. is focused on Web applications
b. is primarily used to encrypt e-mail
c. is a policy which makes public key encryption work on the Internet
d. sits between IP at the network layer and TCP/UDP at the transport layer
e. operates in entrapment mode
Ans: d. sits between IP at the network layer and TCP/UDP at the transport layer
You might also like to view...
What are the benefits of using macros?
What will be an ideal response?
PDF, which stand for ________, is a standard format for documents on the Web
Fill in the blank(s) with correct word
In a filename, the base name is the _____.
A. combined contents of the file B. file extension assigned by the app C. label the user assigns D. description the app adds when saving
Identifiers declared within a class have .
a) block scope b) class scope c) local scope d) None of the above.