1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
4 years ago
12

______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP

/IP family of protocol standards, including use for VPNs.
Computers and Technology
2 answers:
Kitty [74]4 years ago
7 0

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
Korvikt [17]4 years ago
4 0

Answer:

The correct answer is "IP Security".

Explanation:

The IP means internet protocol security .in the network layer of the OSI model Internet protocol is used. The main objective of IP Security provides reliable communication when the packets are sent across the network.

  • The IP Security provides the cryptographic authentication and encryption framework for security development in the Transmission Control Protocol/Internet Protocol family of the protocol standard.
  • The  IP Security provides security in the encryption process of the cryptography.
You might be interested in
While working on a group project, you notice something does not look right in the presentation. You call a meeting with your tea
alexgriva [62]

Answer:

Teamwork

Explanation:

4 0
4 years ago
With landscape photography, which depth of field do you normally want? A) Small B)Small to Medium C)Large D)With landscapes it d
RideAnS [48]
I am not 100% on this but i think you would want a Large depth of field. 
3 0
4 years ago
Read 2 more answers
Which of these is a formatting option that you can use to enhance your text document?
Paha777 [63]
My best guess is the last option (D) tools. Hope it helps
8 0
3 years ago
Read 2 more answers
Assume we have a two-class learning problem where the labeled data consists of 1,000 data points from one class, and 10 data poi
lakkis [162]

Answer:

I don't know

Explanation:

please just thank me I need the points

4 0
4 years ago
Most Muslims are Sunni Muslims; however, the Shiites are a forceful minority in some parts of the Middle East. The Sunni-Shiite
Sever21 [200]
<span>Dispute who should be the leader of the Muslims after the death of Mohammed.<span> </span></span>
3 0
3 years ago
Other questions:
  • A directional antenna issues wireless signals along a(n) ____ direction.
    9·1 answer
  • Which of the following is a professional organization in the field of IT? Society for the Prevention of Cruelty to Animals (SPCA
    6·2 answers
  • The desktops of computers running the same OS all look the same
    8·1 answer
  • What is labor and how does it relate to automobile!!!! NEED HELP PLEASEE
    13·1 answer
  • Of the key reasons for creating organizational units which of the following is not one of them?
    13·1 answer
  • 2x + 3y = 11<br>y = x-3​
    8·2 answers
  • Who requests services and who facilitates services to a client.​
    6·1 answer
  • How to paste picture in word without moving table.
    12·1 answer
  • PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!<br><br><br>​
    9·1 answer
  • How do IT Support professionals measure success? Choose all answers that apply. You will get credit for all answers that are cor
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!