1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
4 years ago
9

What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t

ransport protocol secure (https) network time protocol (ntp) secure/multipurpose internet mail extensions (s/mime)?
Computers and Technology
1 answer:
snow_tiger [21]4 years ago
8 0
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
You might be interested in
You want to add a new Product and Services entry to your client's QuickBooks Online company. The service is installation of a se
Kisachek [45]

Answer:  

The correct answer is Option 3: "Select Service"  

You have to select "Service" in the Second Step.  

Only after that, you'll be able to name the Service in the following step.  

Other options are invalid for a given question.

6 0
3 years ago
The three basic processes of memory are ______.
marysya [2.9K]

Answer:

The correct answer is letter "C": encoding, storage, retrieval.

Explanation:

In psychology, the stages of memory are <em>encoding, storage, </em>and <em>retrieval</em>. Encoding refers to changing the information as it is received so it can be stored in the memory and imply inputs in three kinds: <em>visual (pictures), acoustic (sounds), </em>and<em> semantic (meaning)</em>. Storage is the stage in which the input is retained in the memory, where it is stored, and for how long. Finally, retrieval implies organizing information stored in the memory to recall it.

6 0
3 years ago
You would like to enter a formula that subtracts the data in cell B4 from the total of cells B2 and B3. What should the formula
anastassius [24]

Answer:

=b2 b3-b4 or something close to that, I hope this helps ^^

Explanation:

6 0
4 years ago
Plz plz plz plz plz plz plz plz plz plz plz pl plz plz plz plz plz plz plz plz plz plz plz plz olz plz plz
zvonat [6]

REM PROGRAM TO DISPLAY AVERAGE OF TWO NUMBERS

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

INPUT “ENTER THIRD NUMBER”; C

AV = (A + B + C) / 3

PRINT “AVERAGE OF THREE NUMBERS”; AV

END

hope this helpz

6 0
3 years ago
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,
balandron [24]

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
5 0
3 years ago
Read 2 more answers
Other questions:
  • How can the Column settings be accessed?
    12·2 answers
  • _____ are considered to be the most important element in a computer-based information system.
    8·1 answer
  • The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, the
    12·1 answer
  • Cryptcat is a Linux distribution that includes hundreds of security and hacking tools, including Nessus and Metasploit. It can p
    11·1 answer
  • What is software piracy?
    11·1 answer
  • Impaired drivers are one of the many risks drivers face on the Highway Transportation System. List 3 signs that a driver could b
    10·2 answers
  • You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write th
    5·1 answer
  • You are now going to prepare some reports for the company. Measurements are in metres and volume
    7·1 answer
  • How is information processed within a<br> motherboard between the hard drive, CPU and RAM,
    12·1 answer
  • Helppppppppppppppppppppppppppppppppp
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!