1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
10

Which of these is an example of the integrity principle that can ensure your data is accurate and untampered with?

Computers and Technology
2 answers:
Leokris [45]3 years ago
3 0

Answer:

A: Using Encapsulating Security Payload

B: Using MACs (Message Authentication Codes)

Explanation:

Data integrity means that, the data should be authentic and accurate. This data is not being attempted to change and it is as accurate as sent by the sender. In transmission path different protocols has been used to make sure and maintain the integrity of message or data.

We can perform this by using Encapsulating Security Payload , where the data is encapsulate and hidden between security keys. This protocol ensures the integrity and confidentiality of data between sender and receiver.

MAC (Message authentication Codes) are small codes that are added along with the data while sending by the sender. These codes ensures the data integrity and protect it from the hackers. These codes make sure that data will not changed during transmission.

finlep [7]3 years ago
3 0

Answer:

A. Using Encapsulating Security Payload

Explanation:

The ESP is a transport layer protocol that can ensure your data or the packet has not been tampered and is accurate. It is a transport layer protocol and can ensure that your data is secured. Neither the sender nor the receiver knows anything about the packet or anybody. Hence, the integrity principle, which means to be morally or ethically correct is fulfilled. Whereas the symmetric key is known to the only sender and the recipient. However, either the sender or receiver can be dishonest, and can be wrong on moral or ethics behalf. The MAC address is a checksum, and it just detects whether the message has been tampered or not. Hence, it does not ensure the integrity principle. And the flood guards, we never face the denial of service like situation. And hence that is not an option certainly. The correct option is A.

You might be interested in
Can someone help me i need to write something for cyber bullying
snow_tiger [21]

cyber bullying is when there is a minor on both ends and when a person has the time to go online to pick on you


3 0
3 years ago
Read 2 more answers
What are multiple worksheets
Naddika [18.5K]
More than one worksheet?
5 0
3 years ago
The algorithm and flowchart
tatuchka [14]

Answer:

Make a IPO chart it will be way easier!

Explanation:

4 0
3 years ago
On the classic gameshow The Price Is Right, contestants must guess the price of an object (guesses are distinct). The winner is
Kruka [31]

Answer:

The program code is in explaination

Explanation:

Program code below.

def judge(auction,price):

"""

Function: Returns Name who auctioned very near to give price

Input :

auction : list of tuples

price : auction price

output: returns name of best auction amount holder

"""

diff = [] #storing differences between auctionist amount and price

count = 0

for each_pair in auction:

if each_pair[1]<=price:

diff.append(price-each_pair[1])

else:

count+=1

diff.append(each_pair[1])

if count == len(auction): #check for if no one have auctioned good amount

return None

else:

more_possibility_index = diff.index(min(diff)) #finding index of best amount from diff list

return auction[more_possibility_index][0]

auction = [('Alice',430),('Bob',538),('Carol',487),('David',550)]

price = 520

print(judge(auction,price))

I kept the output at the attachment.

3 0
3 years ago
An acceptable website design is one that meets
Harman [31]

Answer:

i'd say b

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    12·1 answer
  • What does an approved project summary document indicate?
    13·1 answer
  • Can anybody come up with a catchy title for this?
    11·1 answer
  • True or False. When used with the cout object, the endl stream manipulator advances the cursor to the next line on the computer
    6·1 answer
  • Write a c++ program to calculate the approximate value of pi using this series. The program takes an input n that determines the
    13·1 answer
  • Which of the following is an easy steps to take to avoid ESSD well working on your computer?
    5·1 answer
  • A photographer uses which of these tools to form an argument?
    14·2 answers
  • g Write a function named vowels that has one parameter and will return two values. Here is how the function works: Use a while l
    9·1 answer
  • Explain software piracy and Hacking​
    13·2 answers
  • Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!