1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
12

When using IPsec, how can you ensure that each computer uses its own private key pair?

Computers and Technology
1 answer:
aalyn [17]3 years ago
5 0

Answer:

By using digital certificates.

Explanation: Digital certificate are used for the following:

1) Digital certificates are used in public key cryptography functions; they are most commonly used for initializing secure SSL connections between web browsers and web servers.

2) Digital certificates can also be used for sharing keys to be used for public key encryption and authentication of digital signatures.

You might be interested in
Python
Lunna [17]

Answer:

1.  total=sum(k*k for k in range (1,51))

2. total=0

k=1

while k<=n:

total+=k**3

k+=1

Explanation:

7 0
3 years ago
Write a program that uses a custom function to return the cost of purchasing an item, possibly in multiple quantities. The item
alexandr402 [8]

Answer:

def cost(quantity, unit_price, taxable):

   if taxable == "Yes":

       total = (quantity * unit_price) + (quantity * unit_price * 0.07)

   elif taxable == "No":

       total = quantity * unit_price

   return total

q = int(input("Enter the quantity: "))

p = float(input("Enter the unit price: "))

t = input("Is %7 tax applicable? (Yes/No): ")

print(str("$" + str(cost(q, p, t))))

Explanation:

- Create a function called cost that takes three parameters, quantity, unit price, and taxable

- If the tax is applicable, calculate the total with tax. Otherwise, do not add the tax.

- Return the total

- Ask the user for the inputs

- Call the function with given inputs and print the result

3 0
3 years ago
a network administrator for a large oil company has discovered that a host on the company network has been compromised by an att
siniylev [52]

The action that i will recommend an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

<h3>What does revoke certificate mean?</h3>

Certificate revocation is said to be a kind of an act that connote the way of invalidating a TLS/SSL before it is said to have a scheduled expiration date.

Note that A certificate can be revoked fast when its private key depiects signs of being compromised.

Therefore, The action that i will recommend an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about host's certificate from

brainly.com/question/14282680

#SPJ1

5 0
2 years ago
You have no control over who views your social network information
AleksAgata [21]
Of course you have control, it's private and not access able to anyone else. But Social Network itself can control your info.
3 0
4 years ago
Read 2 more answers
10. Realice un algoritmo que solicite números y los sume, solo se detendrá cuando se ingrese un número negativo.
Kisachek [45]
Hi! I don’t know what any of this means but I hope you have an amazing day and I hope god/allah/etc. blesses you :)
sorry I couldn’t answer
7 0
3 years ago
Other questions:
  • One form of the IF field is called an If…Then…Else: If a condition is true, then perform an action; else perform a different act
    15·2 answers
  • Which option should she use to add the terms
    6·1 answer
  • Which option will you use to expose your presentation to the audience
    11·2 answers
  • Please check my answer! (Java)
    6·1 answer
  • I need help with this plz question 2 and 3 asap
    7·1 answer
  • A letter of application should be written on:
    13·1 answer
  • After months of hard work, the big day has finally arrived, and your software will be produced and distributed. Which phase of t
    15·1 answer
  • A program that converts a program to binary all at once and runs the entire program when finished with the conversion.
    5·1 answer
  • C code
    6·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!