1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
13

Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, au

thentication types, key distribution algorithms, SA LifeDuration, etc.?
(A) Perform SMTP enumeration
(B) Perform DNS enumeration
(C) Perform IPsec enumeration
(D) Perform NTP enumeration
Computers and Technology
1 answer:
Fittoniya [83]3 years ago
7 0

Answer:

The answer is Letter C

Explanation:

<em>The Perform IPsec enumeration. The Internet Protocol Security uses cryptographic security service to protect  data over Internet Protocol networks. IPsec supports network level peer authentication, data-origin authentication, data integrity,  data confidentiality , and replay protection.</em>

You might be interested in
1. Which of the following cables are used in networking? Check all that apply.
Rudik [331]

Answer:

ethernet and HDMI for sure those 2

Explanation:

^

8 0
3 years ago
Read 2 more answers
Match the part of the browser window to the correct description.
hodyreva [135]

Answer:

1. Tabs: allows you to drag the window to a new location

Explanation: Tab is the key that is used to switch between different windows or websites that are opened at a time. This can be done by pressing Ctrl+Tab

2. Status Bar: displays whether the Web page is secure or not

Explanation: Status bar is used to show the status or information related to that page. Like Information related safety precaution.

3. Title Bar: allows you to quickly move between different Web sites

Explanation: Title bar consist of the name of different websites that are open at particular time. This shows at the top of the browser. We can quickly move on different websites using title of website.

4. Bookmarks: save Web addresses so you can return to them quickly

Explanation: Bookmarks are the pages that we save in bookmark menu, to re-open the page whenever its needed.

4 0
3 years ago
____________ define the allowable interactions between subjects and objects. credentials responsibilities procedures access cont
liq [111]
<span>Access controls define the allowable interactions between subjects and objects.
</span>They define contains rules which govern the interactions between subjects and objects and permissions subjects can grant to other subjects. The interactions between subjects and objects can be:<span> take, grant, create, remove...</span>
8 0
3 years ago
Read 2 more answers
Which of the following correctly defines a procedure in computer programming? Choose all the apply.
Kazeer [188]

Explanation:

A code block programmers can reuse multiple times

3 0
4 years ago
Read 2 more answers
Can you share a google Docx. with a person who has an Icloud Email?
stiks02 [169]

Answer:

Yes, all you do is click 'share' on the top right and then copy the link, then you would send the link to said to person that has a icloud email.

5 0
4 years ago
Other questions:
  • ____ are types of changes that occur when text has been omitted from a document and must be inserted later.
    10·1 answer
  • Microsoft windows is the least used operating system true or false?
    15·2 answers
  • In cell e9, enter a formula that calculates the session fee for a member. members receive a member discount off the non-member s
    9·1 answer
  • Give the Division Hashing function and the index it maps the key 2000 into, assuming a primary storage area array size of 61 ele
    6·1 answer
  • Which type of DNS zone resolves host names to IP addresses?
    8·1 answer
  • How do you navigate multiple computer screen at one time?
    5·1 answer
  • HELP WILL GIVE BRAINLIEST
    5·1 answer
  • Which of the following processes demonstrates that matter is made up of minute particles? (A) Difussion (B) Capillarity (C) Dist
    15·1 answer
  • Given three packets of size 2,500 Bytes (caution this is Bytes not bits) each are ready inside computer 1 to be transmitted onto
    14·1 answer
  • Which tool is used to see the wireless networks in a given area?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!