1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ludmilka [50]
3 years ago
12

True or false questions. If a statement is false, you must explain the reason why it is false: a). Suppose that TCP is being run

over IPsec with the AH protocol. If TCP retransmits the same packet, then the two packets will have the same sequence number in the AH header. b). Suppose certifier.com creates a certificate for foo.com. Typically the entire certificate would be encrypted with certifier.com's public key.
Computers and Technology
2 answers:
Dima020 [189]3 years ago
8 0

Answer:

a. True

b. False

Explanation:

b. False

At the initial stage, the certificate needs to be encrypted not by the public key of certifier.com but by the by the private key of certifier.com.

After which, the certificate which contains lots information, (i.e there's more information in the certificate than just the public key to be certified). The certificate also the CA’s information, the certificate expiration date, etc.

Only this information’s digital fingerprint is encrypted by the certifier.com’s private key.

DIA [1.3K]3 years ago
7 0

Answer:

Explanation:

The TCP protocol uses the OPTIONS field to exchange information like maximum segment size accepted between the TCP layers on the two hosts. The flags currently defined are

• URG Urgent pointer field is valid

• ACK Acknowledgement field is valid

• PSH This segment requests a push

• RST Reset the connection

• SYN Synchronize sequence numbers

• FIN Sender has reached end of its byte stream

OFFSET

This integer indicates the offset of the user data within the segment. This field is only required as the number of bits used in the OPTIONS field can vary

URGENT POINTER

This field can be initialized to point to a place in the user data where urgent information such as escape codes etc. are placed. Then the receiving host can process this part immediately when it receives the segment.

TCP/IP (or rather; the TCP/IP protocol suite) is not limited to the TCP and IP protocols, but consist of a multitude of interrelated protocols that occupy the upper three layers of the ARPA model. With the exception of the Point-to-Point Protocol (PPP) which resides in the upper half of the Network Interface Layer, the TCP/IP suite generally does not include the Network Interface layer, but merely depends on it for access to the medium.

The Network Interface layer

The Network Interface layer is responsible for transporting frames between hosts on the same physical network. It is implemented in the Network Interface Card or NIC, using hardware and firmware (i.e. software resident in Read Only Memory).

The NIC employs the appropriate medium access control methodology, such as CSMA/CA, CMSA/CD, token passing or polling, and is responsible for placing the data received from the upper layers within a frame before transmitting it. The frame format is dependent on the system being used, for example Ethernet or Frame Relay, and holds the hardware address of the source and destination hosts as well as a checksum for data integrity.

You might be interested in
Given a Scanner reference variable named input that has been associated with an input source consisting of a sequence of strings
Ghella [55]

Answer:

count = 0;

longest =0;

String myString = new String();

while (input.hasNext()){

myString = input.next();

if (myString.length() == longest) count++;

else

if (myString.length() > longest){

longest = myString.length();

count = 1;

}

}

Explanation:

5 0
3 years ago
Read 2 more answers
What service determines which resources a user can access along with the operations that a user can perform?.
sweet [91]

The authorization services determine which resources a user can access along with the operations that a user can perform.

<h3>What is authorization service?</h3>

The authorization service makes sure the user has permission to access a certain resource. Role-based access control (RBAC) and list-based access control are two methods for authorizing (LBAC).

The process of granting anyone permission to use a resource is called authorization.

The description may sound bizarre, but there are numerous actual examples that may help you comprehend what authorization means and how to utilize it with computer systems.

Thus, the authorization services determine which resources a user can access along with the operations that a user can perform.

Learn more about the authorization services here:

brainly.com/question/10436962

#SPJ4

8 0
2 years ago
Why is remixing so popular with artists and other people online?
True [87]

Answer:

D.It is a way to be creative without having to construct totally new pieces.

Explanation:The answer is -D- because it is true. Remixing is a way of being creative, and you don't have to make completely new pieces.

4 0
3 years ago
Read 2 more answers
Discuss the multi-meter’s D’ Arsonval movement.​
kvv77 [185]

Answer:

The D'Arsonval–Weston meter movement uses a moving coil which carries a pointer and rotates on pivots or a taut band ligament. ... It is easily adapted to read heavier currents by using shunts (resistances in parallel with the basic movement) or to read voltage using series resistances known as multipliers.

7 0
3 years ago
What is the difference between a Is your Milling machine and grinding machine
Law Incorporation [45]

Answer:

one is used for milling and one is used for grinding

Explanation:

8 0
3 years ago
Other questions:
  • #Imagine you're writing a program to check if a person is
    8·1 answer
  • Torque is defined as _____.
    7·1 answer
  • The following program uses a variable workHoursPerWeek rather than directly using 40 in the salary calculation expression.
    12·1 answer
  • Ron travels extensively. He posts articles, photos, and videos about his experiences on a website. Which type of electronic comm
    9·1 answer
  • Write a program that asks the user for the name of a text file. the program should display the last 10 lines of the file on the
    13·1 answer
  • Consider the following high-level recursive procedure: long long int flong long int n, long long int k long long int b b k+2; if
    9·1 answer
  • Abdhbhbhsbfhsbhcvdhcbsdbhsvhgvhdsgvfhsgdvfhgdsvghcghvc
    10·2 answers
  • What is stands for BCPL explain ?​
    9·1 answer
  • A user input is when the user interacts with the program by typing.<br> True<br> False
    11·2 answers
  • Which step do you think is most useful from big data life cycle and why?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!