1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
13

Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, au

thentication types, key distribution algorithms, SA LifeDuration, etc.?
(A) Perform SMTP enumeration
(B) Perform DNS enumeration
(C) Perform IPsec enumeration
(D) Perform NTP enumeration
Computers and Technology
1 answer:
Fittoniya [83]3 years ago
7 0

Answer:

The answer is Letter C

Explanation:

<em>The Perform IPsec enumeration. The Internet Protocol Security uses cryptographic security service to protect  data over Internet Protocol networks. IPsec supports network level peer authentication, data-origin authentication, data integrity,  data confidentiality , and replay protection.</em>

You might be interested in
What are some things you can do with labels in Word? Check all that apply. make them include audio print them on the inside of t
____ [38]

Answer:

word does  not support audio, so its not A, but you can customize them, so its probably C

Explanation:

7 0
3 years ago
Can anyone tell me what's wrong with my pc. When I turn it on it lights up the ram, motherboard, and fans. The cooler and case f
Mice21 [21]

1 or 2 ways I can try to figure out and see what is causing your computer to do this. 1 when was the last time you shut off  OR was doing on the computer? If your problem gets fixed make sure you close all running apps so the apps don't update while your computer is shutdown. 2 did you or something unplug the cables? Or maybe a virus caused something. Try to unplug every cable and wait about 5-10 minutes and if your computer is still not working, I would advise contacting an administrator.

Hope this helped.

6 0
3 years ago
Following the car in front of you at a closer distance _____.
tiny-mole [99]

Answer:

B. Doesn’t get you to your location faster.

Explanation:

Following the car in front of you at a closer distance doesn’t get you to your location faster.

6 0
3 years ago
Read 2 more answers
Is jesus dead or alive
Morgarella [4.7K]

Answer:

Explanation:

i think he alive but in heaven i dunno

8 0
3 years ago
How do hardware and software work together to allow a user to perform a function?
qaws [65]

Answer:

jointly

Explanation:

Because Hardware and Soft ware have to JOIN together to make something work

I hope i helped!

4 0
3 years ago
Read 2 more answers
Other questions:
  • When a person buys something from an app store, the cost of the item is charged to a credit card whose number often is known by
    5·1 answer
  • An access control system that grants users only those rights necessary for them to perform their work is operating on which secu
    6·1 answer
  • Kevin manages the security for his company and is working to implement a kernel integrity subsystem for key servers. Of the foll
    9·1 answer
  • Experienced students may serve as mentors if they are at least age 21 and have at least 3 years of post-secondary education. In
    5·1 answer
  • Which custom configuration is most likely to include a raid array?
    14·1 answer
  • A wireless network does not benefit like a wired network does, when it comes to collision reduction. Which device reduces collis
    6·1 answer
  • Pick one of the following scenarios and
    6·1 answer
  • Juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh
    6·1 answer
  • Check all of the file types that a Slides presentation can be downloaded as.
    5·2 answers
  • A software is made from​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!