1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
4 years ago
9

What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t

ransport protocol secure (https) network time protocol (ntp) secure/multipurpose internet mail extensions (s/mime)?
Computers and Technology
1 answer:
snow_tiger [21]4 years ago
8 0
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
You might be interested in
Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
Arisa [49]

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

4 0
3 years ago
An asterisk (*) following a cell reference in a formula is the arithmetic operator that directs excel to perform the division op
lubasha [3.4K]
You are correct there. the * operand tells Excel to multiple the two cells or variables.
7 0
4 years ago
1.07 (PX: 2 points)Some early computers protected the operating system by placing it in a memory partition that could not be mod
Anna11 [10]

Answer:

The user cannot make internal changes, or personalize the computer. Also it would make it very easy for viruses to get into the computers and ccorrupt the entire thing. There is a similar example of this today in Modern Day chromebooks, but earlier computers were not as safe or secure. Also the fact that it can takes up massive amounts of data, requiring more server storage or data storage facilities.

6 0
3 years ago
Jarvis wants to buy a basic scanner for daily use. Which scanner will be suitable for him?
Romashka-Z-Leto [24]

Answer:

A

Flatbed scanner often come with sheet feeders for scanning multiple sheets of paper rather than one at time

8 0
3 years ago
Read 2 more answers
Wanna join a pad let anyoone
aleksandr82 [10.1K]

Answer: you do not use Brainly for this

Explanation: And no

7 0
3 years ago
Read 2 more answers
Other questions:
  • You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha
    15·2 answers
  • Keyshia now wants to remove the background of the image. She marks the areas she wants to keep and the areas she wants to remove
    13·2 answers
  • Easy 25 points answer what is it called that you use only 1 and 0 like this 1010010011001100011110001010010101001010101010010101
    5·1 answer
  • Explain the importance of determinism in an industrial LAN
    8·1 answer
  • Which tool should be used when a fastener, such as a lug nut, is extremely tight
    6·2 answers
  • I’ll mark brainliest if correct
    10·1 answer
  • Can someone else kill Raz and I can still get the challenge done by collecting the artifact in fort nite?
    13·1 answer
  • PLEASEEE HELPPP im gonna cry
    11·2 answers
  • True or false, USBs are slower than RAM.
    15·1 answer
  • 8.10 Code Practice Question 1
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!