1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
7

SSL/TLS is used for ________.

Engineering
1 answer:
Nana76 [90]3 years ago
4 0

Answer:

1.Originally developed by Netscape, SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS). SSL/TLS can be used for Web applications

2.Small malware programs that download larger malware programs are called downloaders

3. Single network addresses in different single networks are neither unique nor unique if the two single networks use the same technology standards

4. Converting application messages into bits is called encoding

5. Guarantees by a provider to meet certain delivery quality specifications are called service level agreements

6. Advanced persistent threats are particularly dangerous for enterprises, as hackers have ongoing access to sensitive company data. They are extremely dangerous for the victim

7. In antivirus filtering, the best ways to filter currently use BEHAVIOURAL DETECTION

8. The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is SPYWARE

9. Firewall log files should be read EVERYDAY

10. When a firewall identifies an attack packet, it both discards the packet and copies information about the packet into a log file

11. IT security employees are the most difficult employees

12. In authentication, the SUPPLICANT is the party trying to prove his or her identity.

13. In a firewall, VPN traversal reduces firewall filtering effectiveness

14. DIRECTLY-PROPAGATING WORM can spread more rapidly

15 UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.

16. Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a SYN/ACK segment.

17. 802.11 data link layer standards govern neither access point operation nor frame organization

18. Credit card number thieves are called CARDERS

19. Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is CONFIDENTIALITY

20. Iris scanning is attractive because of its PRECISION

21. The source socket is 60.171.18.22:57707. The source is a CLIENT

You might be interested in
How is air pressure affected by the shape of an aircraft wing
oksano4ka [1.4K]

Answer:

Airplanes' wings are curved on top and flatter on the bottom. That shape makes air flow over the top faster than under the bottom. As a result, less air pressure is on top of the wing. This lower pressure makes the wing, and the airplane it's attached to, move up.

Explanation:

3 0
2 years ago
A series of concrete pillars have been built on the border between Kuwait and Iraq. They are there to __________ the border.
Gala2k [10]

A series of concrete pillars have been built on the border between Kuwait and Iraq. They are there to demarcate the border.

<h3>What is a border?</h3>

A border is a geographical boundary that separate<em> countries, states, provinces, counties, cities, and towns.</em>

A series of concrete pillars have been built on the border between Kuwait and Iraq. They are there to demarcate the border.

Find out more on border at: brainly.com/question/811755

5 0
2 years ago
2. When it comes to selling their crop, what are 3 options a farmer has when harvesting their grain?
tiny-mole [99]

Answer:

Sell his crop, use his crop as food, and sell his crop

Explanation:

6 0
2 years ago
It is appropriate to use the following yield or failure criterion for ductile materials (a) Maximum shear stress or Tresca crite
Nataly [62]

Answer:

(b)Distortion energy theory.

Explanation:

The best suitable theory for ductile material:

       (1)Maximum shear stress theory (Guest and Tresca theory)

It theory state that applied maximum shear stress should be less or equal to its maximum shear strength.

      (2)Maximum distortion energy theory(Von Mises henkey's        theory)

It states that maximum shear train energy per unit volume at any point  is equal to strain energy per unit volume under the state of uni axial stress condition.

But from these two Best theories ,suitable theory is distortion energy theory ,because it gives best suitable result for ductile material.

6 0
2 years ago
I want to solve the question
DedPeter [7]

Answer:

yes.

Explanation:

5 0
3 years ago
Other questions:
  • If 1 uF capacitor is fully charged with 120 V across it, how much energy is stored in it? (a) 7.2 kJ (b) 7.2 mJ (c) 0.12 mJ (d)
    6·1 answer
  • 1. How many types of pumps are present?​
    14·1 answer
  • For the reactions of ketone body metabolism, _______.
    15·1 answer
  • What's a disadvantage of highest MERV-rated filters?
    10·2 answers
  • Am i eating ramon nooddles rn
    10·2 answers
  • Write a program that uses while loops to perform the following steps: Step a: Prompt the user to input two integers: firstNum an
    12·1 answer
  • What friction rate should be used to size a duct for a static pressure drop of 0.1 in wc if the duct has a total equivalent leng
    9·1 answer
  • What do Engineering Systems achieve?
    8·1 answer
  • Teaching how to characterize and implement high speed power devices for tomorrow's engineers
    10·1 answer
  • Find the differential and evaluate for the given x and dx: y=sin2xx,x=π,dx=0.25
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!