1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
4 years ago
12

______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP

/IP family of protocol standards, including use for VPNs.
Computers and Technology
2 answers:
Kitty [74]4 years ago
7 0

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
Korvikt [17]4 years ago
4 0

Answer:

The correct answer is "IP Security".

Explanation:

The IP means internet protocol security .in the network layer of the OSI model Internet protocol is used. The main objective of IP Security provides reliable communication when the packets are sent across the network.

  • The IP Security provides the cryptographic authentication and encryption framework for security development in the Transmission Control Protocol/Internet Protocol family of the protocol standard.
  • The  IP Security provides security in the encryption process of the cryptography.
You might be interested in
A(n) _______ is text or a graphic you can click to jump to another file or to somewhere else in the same file. quizle
Paul [167]
Hyperlink



______________________________
5 0
3 years ago
In the given switch statement, what will be displayed if the value of var is 3? switch(var) { case 1: System.out.println("Apple"
olga_2 [115]

Answer:

The output of the given program is  

Peach Pear Pineapple.

Explanation:

since the value of var is so control will move to the case 3 directly and executed the statement inside the case 3 so it will print "Peach" in window after that their is no break statement in the case 3 the control moves the case 4 and executed the statement inside the case 4 so it will print "Pear" in window again there is no break statement in the case 4 the control moves the case 5 and executed the statement inside the case 5 so it will print "Pineapple".Finally, the break statement is reached the execution of the program is stopped.

3 0
3 years ago
Can someone help answer this. I'm on a time crisis rn and need to pass or I fail the class. There are games that cannot be descr
const2013 [10]
  • There are games that cannot be described as a single or two genres.
  • Yes there should be some genres invented.
  • Because games are now become a everyday requirement for entertainment .

Uses of genre:-

  • Genres are used in Readers as well as writers.
  • By using genre patterns in writers it has been accepted by readers for accomplishing their purposes.
  • Genres allow both writers and readers to establish a working relationship between each other.
  • Both writers and readers are required for gamers and game publishers.
  • So Genres are very useful to them.
5 0
3 years ago
Which aspect of business does accounting measure?
VladimirAG [237]

financial aspect

Accounting measurement is the computation of economic or financial activities in terms of money, hours or other units. An accounting measurement is a unit of some measurable element that is used to compare and evaluate accounting data. Accounting is often measured in terms of money.

6 0
3 years ago
Jack is writing a paragraph for a school assignment. He proofreads his paper and notices that he used the word, "then" many time
Lynna [10]

He should use a Thesaurus.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Clifford created a table using OpenOffice Writer and entered some information into the table. Later, he needed to add more rows
    15·2 answers
  • Suppose we are comparing implementations of insertion sort and merge sort on the same machine. for inputs of size n, insertion s
    10·1 answer
  • How to solve 3(x - 2) = 9x<br><img src="https://tex.z-dn.net/?f=3%28x%20-%202%29%20%3D%209x" id="TexFormula1" title="3(x - 2) =
    14·1 answer
  • The class attribute
    8·1 answer
  • What is the education level of a majority of the Power, Structural, and Technical Systems workers?
    7·1 answer
  • Kerry wants to save her file but give it a new name. Kerry should use the ____ command
    7·1 answer
  • Why does atmospheric pressure does not effect on planes,jet planes and rocket?​
    9·1 answer
  • What is an example of value created through the use of Deep Learning?​
    12·2 answers
  • DOES ANYONE KNOW COMPUTER SCIENCE?
    8·1 answer
  • many police departments coordinate youth-oriented programs as part of their prevention efforts. which of the following is not an
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!