1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
13

Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, au

thentication types, key distribution algorithms, SA LifeDuration, etc.?
(A) Perform SMTP enumeration
(B) Perform DNS enumeration
(C) Perform IPsec enumeration
(D) Perform NTP enumeration
Computers and Technology
1 answer:
Fittoniya [83]3 years ago
7 0

Answer:

The answer is Letter C

Explanation:

<em>The Perform IPsec enumeration. The Internet Protocol Security uses cryptographic security service to protect  data over Internet Protocol networks. IPsec supports network level peer authentication, data-origin authentication, data integrity,  data confidentiality , and replay protection.</em>

You might be interested in
Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia"). Assume also that stdin is a v
zaharov [31]

Answer:

// program in java.

import java.util.*;

// class definition

class Main

{// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // object to read input

Scanner scr=new Scanner(System.in);

 // ask to enter name

System.out.print("Enter Your name: ");

 // read name from user

String NAME=scr.nextLine();

// print message

System.out.println("Greetings,"+NAME);

     

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read name from user with the help of scanner object and assign it to variable "NAME".Then print a Greetings message as "Greetings,NAME" where NAME will be  replaced with user's input name.

Output:

Enter Your name: Rachel                                                                                                    

Greetings,Rachel

5 0
3 years ago
Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information
Rudiy27

Answer:

true

Explanation:

the answer is true dude

5 0
2 years ago
What are the constraints of mine shaft head gear​
Serhud [2]

Answer:

Mine headgear constructions support wheel mechanisms for suspending winding cables that transport workers and ore up and down deep level shafts. These strange anthropomorphic structures have become the iconic symbol for mining.

4 0
3 years ago
An engineer plans to connect three switches (SW1, SW2, and SW3) in a lab. Before connecting the switches, he starts by configuri
g100num [7]

Answer:

c. All use SW3's database because SW3 has the highest revision number.

Explanation:

In this particular configuration, the three switches will definitely be connected to one another by the presence of some path with the specific trunks. As a result, the database with the most revision number will ultimately win. The process of the STP election does not have any influence on the selection of the VTP.

4 0
3 years ago
Two types of binocular depth cues are __________ and __________.
OverLord2011 [107]
Binocular depth cues are the 'things' that help us to judge distance. The two main ones that relate to binocular vision are:

1. Convergence.
This is the fact that as we get closer to an object, our eyes begin to point inward to remain focused on the object. I.e. we go cross eyed. 

2. Disparity
This is the fact that our eyes both see a different image when focused on an object because they are actually looking at it from a different perspective (about 6 centimeters apart). This disparity changes based on the object distance from the observer so is also a cue used by our brain to judge distance.
4 0
3 years ago
Other questions:
  • the task is to ask the user for three numbers and find the average which pseudocode gives you the comment outline for task​
    10·1 answer
  • Which of these statements best describes an application programming interface?
    5·1 answer
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • What is the Difference between CUI and GUI
    14·2 answers
  • Effective character encoding requires:
    8·1 answer
  • What type of file is MyFile.dll?
    14·2 answers
  • why when I click apostrophe I get an accent mark? And when I try quotation marks I get this ( ¨ ) how do I change that or why is
    13·1 answer
  • When does MMF2 inactivate an Active object? A. When the score is higher than the game's previous high score B. When the player d
    15·1 answer
  • Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False
    9·2 answers
  • Draw the following diagrams to represent the information system chosen in assignment 1 Context diagram The context diagram is ex
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!