1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
7

) Recall that TCP has no security. If an application author wants to pass his messages to another process that can encrypt them,

at what layer will that encryption (like TLS or SSL) be found?
Computers and Technology
1 answer:
emmainna [20.7K]3 years ago
8 0

Answer:

The explanation for the following question is described in the explanation section below.

Explanation:

Even though TCP seems to have no authentication, if an applicator decides to transfer its signals or messages to some other mechanism that can encrypt them, instead Transport Layer is perhaps the layer where encryption was located.

  • This layer protection is an acceptable use policy that promotes security and authentication when exchanging information.
  • TLS would be the authentication protocol where authentication is done whenever the sender wishes to transfer his information to another mechanism that can encrypt itself.
You might be interested in
What is computer science​
adell [148]

Answer:

computer science is the study of computer and computing as well as theoretical and practical applications.

pls give me thanks ☺️☺️

7 0
3 years ago
Which of the following scenarios falls into the category of network crimes?
solong [7]

Answer:

B

Explanation:

Hope it helps!

3 0
2 years ago
Read 2 more answers
Is a bottle opener considered an engineered item?
KIM [24]
Yes actually it is it’s a machine to use for opening bottles such as cans n other
3 0
3 years ago
Can someone please tell me what I’m doing wrong ? Please and it’s due on Thursday!!
liberstina [14]

Answer:

Sure. In Unit test 5, it's looking for 1 instead of 0. You are returning 0 instead of 1.

0 requires 1 digit to express it and should therefore return 1.

In line 6, change the 0 to a 1.

8 0
2 years ago
Who still plays old Nintendo 64 games?
Lesechka [4]

Answer:

I play Nintendo 64 games when I was young. I use to love playing Mario 64 as well.

8 0
2 years ago
Read 2 more answers
Other questions:
  • which of the following is involved in ordering an outline. A.grouping B.merging C.organizing D.arranging
    10·1 answer
  • ____________ is a widely accepted international best practices framework for implementing information systems security.
    12·1 answer
  • With a presentation open, you can hover your mouse pointer over a design theme on the Design tab, and PowerPoint will display th
    14·1 answer
  • What are some things you can do to clean up your digital footprint.
    9·1 answer
  • Reference variables allow arguments to be passed by ____________.
    7·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    12·1 answer
  • Can someone reply me
    11·1 answer
  • What is the best method to avoid getting spyware on a machine
    6·1 answer
  • ________ is a utility program included with most operating systems that allows you to move or eliminate files and give your oper
    14·1 answer
  • What does a companys code of ethics cover
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!