1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
9

What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t

ransport protocol secure (https) network time protocol (ntp) secure/multipurpose internet mail extensions (s/mime)?
Computers and Technology
1 answer:
snow_tiger [21]3 years ago
8 0
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
You might be interested in
Where are Micro USB connectors used the most?
jeka94

Answer:

desktops............

3 0
3 years ago
Read 2 more answers
What file may contain data written to it in case of an unexpected error or program shut-down?
Delicious77 [7]
I would have to say it would be A. log file.
8 0
3 years ago
Read 2 more answers
Describe shortly about the following Linux directories and theirpurpose,1. lib2. etc3. Boot4. Root5. home
Bingel [31]

Answer:

 Linux directories and their purposes are:

1) lib - Lib file contained the share object library file which necessary to boots system and this directory contain file module stored in the kernel.

2) etc - etc file is the configuration file that they are local in the machines. When the program run these file are stored in the directories. this can be static and do not executable directory.

3) Boot - Boot file are stored in the directory which required processing of linux boot and such files are included in the linux kernel of the file.

4) Root - Root file are the best user root directory and user cannot view this directories from there account. This file usually contain administrative file system.  

5) Home - Home file contained the user directory and it is the default system of linux. Home directory helps user to enable any network system to access there home directories.

5 0
3 years ago
1. It is acceptable to use a jack that has been
krok68 [10]
D. None of the above
7 0
3 years ago
Software is:
irakobra [83]
I think the answer is A
7 0
3 years ago
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • They begin beating it with a hose to find out what it really means. How does the figurative language in this excerpt reveal Coll
    9·2 answers
  • What is the financial aspect for a business as to what database software they will buy?
    6·1 answer
  • State two functions of windows environment​
    9·1 answer
  • The person who can give a short defination of subroutine will get the brainliest.
    9·1 answer
  • What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
    5·1 answer
  • What can a scientist do if he repeats and experiment and gets diffrent results?
    5·1 answer
  • Being nice take the points​
    9·1 answer
  • Why do designers of smartphones hide computer processing details from
    14·2 answers
  • How does the quantity of data affect the accuracy of an experiment?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!