1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
13

Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt

hough not for the outermost IP header? Point-to-Point Protocol (PPP) Layer 2 Forwarding (L2F) Protocol Point-to-Point Tunneling Protocol (PPTP) Encapsulating Security Payload (ESP)
Computers and Technology
1 answer:
Sphinxa [80]3 years ago
6 0

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

You might be interested in
When Twitter is used to gather a large group for a face-to-face meeting it is called
Verdich [7]
The answer is flash mob. They called it flash mob when a large number of people in twitter gather in group for a centralized face to face meeting. In flash mob, people are gathering to be able to create a community that is helping each other or even just talking to each other.
8 0
3 years ago
"running computer programs and their data are stored in ___"
Lesechka [4]

Solution:

Running computer programs and their data are stored in Rom.

ROM is "built-in" computer memory containing data that normally can only be read, not written to. ROM contains the programming that allows your computer to be "booted up" or regenerated each time you turn it on. Unlike a computer's random access memory (RAM), the data in ROM is not lost when the computer power is turned off. The ROM is sustained by a small long-life battery in your computer.

5 0
3 years ago
Read 2 more answers
Renter’s insurance is not necessary if you don’t have a lot of expensive things.
attashe74 [19]

Wrong, You should get renters insurance to insure your items that you do have or will recieve in the future are safe

7 0
3 years ago
What are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market
kicyunya [14]

Answer:

Disruptive innovation

Explanation:

Disruptive innovation are considered those new technologies, products or services whose application can greatly impact the manner in which an industry or a market functions. This is because the surpass the existing dominant product or technology. One example of a disruptive innovation is the internet. The internet altered the manner in which business was done by companies, but negatively affected those who refused to adopt it.

4 0
3 years ago
Sonora wants to extend the cells to be added in her formula. What is the quickest way to add more cells?
djyliett [7]

Answer:

D

Explanation: took the test on edge

7 0
3 years ago
Read 2 more answers
Other questions:
  • What substance was the first photograph made from?
    6·1 answer
  • It is used to replace numeric number of a website​
    7·1 answer
  • Discus the pros and cons of Internal cloud service and External cloud service for both Infrastructure as a service and Applicati
    11·1 answer
  • Find two consecutive even integers such that twice the smaller is 16 more than the larger
    10·1 answer
  • Provide examples of the cost of quality based on your own experiences
    14·1 answer
  • Amy just added a 462 meter run of fiber optic cable to the network what should she do next?
    10·1 answer
  • The user cannot use a computer system without.................... software<br><br>​
    13·2 answers
  • PLEASE HELP!
    14·2 answers
  • What is the purpose of a Post Mortem Review? (5 points)
    5·1 answer
  • A keyboard would be considered what 2 things
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!