1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
10

Which of these is an example of the integrity principle that can ensure your data is accurate and untampered with?

Computers and Technology
2 answers:
Leokris [45]3 years ago
3 0

Answer:

A: Using Encapsulating Security Payload

B: Using MACs (Message Authentication Codes)

Explanation:

Data integrity means that, the data should be authentic and accurate. This data is not being attempted to change and it is as accurate as sent by the sender. In transmission path different protocols has been used to make sure and maintain the integrity of message or data.

We can perform this by using Encapsulating Security Payload , where the data is encapsulate and hidden between security keys. This protocol ensures the integrity and confidentiality of data between sender and receiver.

MAC (Message authentication Codes) are small codes that are added along with the data while sending by the sender. These codes ensures the data integrity and protect it from the hackers. These codes make sure that data will not changed during transmission.

finlep [7]3 years ago
3 0

Answer:

A. Using Encapsulating Security Payload

Explanation:

The ESP is a transport layer protocol that can ensure your data or the packet has not been tampered and is accurate. It is a transport layer protocol and can ensure that your data is secured. Neither the sender nor the receiver knows anything about the packet or anybody. Hence, the integrity principle, which means to be morally or ethically correct is fulfilled. Whereas the symmetric key is known to the only sender and the recipient. However, either the sender or receiver can be dishonest, and can be wrong on moral or ethics behalf. The MAC address is a checksum, and it just detects whether the message has been tampered or not. Hence, it does not ensure the integrity principle. And the flood guards, we never face the denial of service like situation. And hence that is not an option certainly. The correct option is A.

You might be interested in
The data table provides the results of several what-if analyses, but results are often clearer if you include a(n
r-ruslan [8.4K]
CVP Chart.
Source: "New Perspectives on Microsoft Excel 2010: Comprehensive" by June Parsons, Dan Oja, Roy Ageloff, Patrick Carey.
4 0
3 years ago
Which is said to be ‘computer on a chip’ (a) Micro processors (b) Microcontrollers (c) Both (c) None of the above
fiasKO [112]
I think the answer would be A
5 0
3 years ago
Write a few statements that open a file called "greeting", write the message "hey!" to the file -- and then close it. declare an
pshichka [43]
C++:

int main () {

std::ofstream output {"greeting.txt"};
output << "hey!";
output.close();

return 0;
}
6 0
3 years ago
Read 2 more answers
The true or false questions.<br><br> 1.egrep can accept multiple filenames as input arguments.
BlackZzzverrR [31]

Answer: True  

Explanation: yes, it is true that egrep can accept multiple filenames as input arguments for example egrep -r "text1/text2", so this will search in all the sub directories . E grep is also known as 'grep -E' which belongs to the group of grep function and we used egrep to separate multiple patterns for OR conditions. This is also very less time consuming if you are going to search multiple input arguments in multiple different logs at the same time.

5 0
3 years ago
Increasing your margins will increase the amount of space you have to type text on your document. Please select the best answer
Ksenya-84 [330]

It is false because if the margins, the space on the side of a paper, gets bigger, that means there is more emptiness and less space for text.

4 0
3 years ago
Other questions:
  • How can i change ip address <br>​
    7·1 answer
  • How do you tack pictures for this app
    15·1 answer
  • The Internet shopping cart is an example of which version of the web?
    15·1 answer
  • Linda is viewing the campaign report in her Google Ads account after successfully implementing conversion tracking tags for her
    7·1 answer
  • A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or
    8·1 answer
  • In our discussion of Computer Hardware, we talked about three essential hardware components that are there inside every computer
    14·1 answer
  • Which job qualifications are typical for someone who wants to work in Information Support and Services?
    8·2 answers
  • NEED HELP ASAP
    13·2 answers
  • What will be displayed after this code segment is run?
    5·1 answer
  • How to send an email to multiple recipients individually.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!