1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
10

Which of these is an example of the integrity principle that can ensure your data is accurate and untampered with?

Computers and Technology
2 answers:
Leokris [45]3 years ago
3 0

Answer:

A: Using Encapsulating Security Payload

B: Using MACs (Message Authentication Codes)

Explanation:

Data integrity means that, the data should be authentic and accurate. This data is not being attempted to change and it is as accurate as sent by the sender. In transmission path different protocols has been used to make sure and maintain the integrity of message or data.

We can perform this by using Encapsulating Security Payload , where the data is encapsulate and hidden between security keys. This protocol ensures the integrity and confidentiality of data between sender and receiver.

MAC (Message authentication Codes) are small codes that are added along with the data while sending by the sender. These codes ensures the data integrity and protect it from the hackers. These codes make sure that data will not changed during transmission.

finlep [7]3 years ago
3 0

Answer:

A. Using Encapsulating Security Payload

Explanation:

The ESP is a transport layer protocol that can ensure your data or the packet has not been tampered and is accurate. It is a transport layer protocol and can ensure that your data is secured. Neither the sender nor the receiver knows anything about the packet or anybody. Hence, the integrity principle, which means to be morally or ethically correct is fulfilled. Whereas the symmetric key is known to the only sender and the recipient. However, either the sender or receiver can be dishonest, and can be wrong on moral or ethics behalf. The MAC address is a checksum, and it just detects whether the message has been tampered or not. Hence, it does not ensure the integrity principle. And the flood guards, we never face the denial of service like situation. And hence that is not an option certainly. The correct option is A.

You might be interested in
You want some points? whoever answers first gets 48 points. no cap. better be quick.
LekaFEV [45]

Answer:

4

Explanation:

5 0
3 years ago
Read 2 more answers
Martha is developing a software program in C++ and has a question about how to implement a particular feature. She performs an o
VLD [36.1K]

Answer:

A blog

Explanation:

A blog is a regularly updated website or web page, typically one run by an individual or small group, that is organised by posts.

7 0
3 years ago
Any Genshin Impact Players? If so, who's your main?
Fantom [35]
I want to start playing!! it seems super cool, don’t know much ab it but i like paimon lol
5 0
3 years ago
Read 2 more answers
What does setTempo() allow you to do in EarSketch?
vlada-n [284]
Specify the tempo of a song
4 0
2 years ago
How many warnings do u get before you like lose your account?
Step2247 [10]

Answer: 5 warnings untill your account is gone.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Who is the owner of microsoft company​
    12·1 answer
  • Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
    5·1 answer
  • The _____ requirements are associated with the efficiency, maintainability, portability, reliability, reusability, testability,
    13·2 answers
  • What is the effect of persistence of game worlds in social video games?
    14·2 answers
  • ساعدوني على الإجابة على هذه الأسئلة
    11·1 answer
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
  • 100 points for this and brainlyist lol
    11·1 answer
  • If you notice that a worksheet displays columns A, B, C, E, and F, what happened to column D?
    9·1 answer
  • How can I use HTML to express a personal value
    13·1 answer
  • Three types of query​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!