1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
13

Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt

hough not for the outermost IP header? Point-to-Point Protocol (PPP) Layer 2 Forwarding (L2F) Protocol Point-to-Point Tunneling Protocol (PPTP) Encapsulating Security Payload (ESP)
Computers and Technology
1 answer:
Sphinxa [80]3 years ago
6 0

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

You might be interested in
Richard wants to create a cloud-based system that will be a centralized repository of log files from various servers in the orga
jeyben [28]

Answer:

CAD ( d )

Explanation:

Richard should use CAD to create a cloud-based system, since he wants it to be a centralized repository of log files to be taken from the different servers associated with the organization

CAD ; Computer aided design software is the best software to be used because files created using CAD can be easily stored in cloud and it is easily accessible.

4 0
3 years ago
Identify the programmer’s responsibility in maximizing the programs reliability by
Gekata [30.6K]

Software has to be reliable so that it does not create conflict or negative feelings amongst those who use it.

In this world where humans increasingly rely on the internet and software for information, programmers have to take special care so as to ensure that the members of the society are not affected negatively.

For instance, there have been moments when software led to negative effects such as:

  • when Goøgle's algorithm tagged a black couple as gorillas
  • Facebøok's algorithm tagged black men as gorillas
  • Goøgle maps gave people the wrong directions

These are but a few instances where algorithms have messed up.

We can therefore conclude that it is important that programmers take extra care when designing programs so that they do not lead to negative feelings.

<em>Find out more at brainly.com/question/21328677.</em>

6 0
3 years ago
Which setting is used to determine the order of printing pages? Collation Settings, Orientation Settings, Margin Settings, Scali
VARVARA [1.3K]

Answer:

colliation

Explanation:

8 0
3 years ago
Read 2 more answers
How to become a software tester?
Delicious77 [7]

Answer:

<em>Certified Software Tester (CSTE): This certification often requires a bachelor's degree and two years of relevant experience, or six years of experience with no degree, to qualify for the test</em>

6 0
2 years ago
Read 2 more answers
You can enter numbers in the Zoom field to zoom in or out a precise amount. True or false
sesenic [268]
True is the answer to that
5 0
3 years ago
Other questions:
  • Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
    13·1 answer
  • Which of the following is an example of a word processing program?
    11·2 answers
  • if your instructors teaching style is very different from your learning preference your best choice is to one work on your weake
    10·1 answer
  • Digital Subscriber Line (DSL) is the only Internet connection option available for a small office in the middle of nowhere. Whic
    15·1 answer
  • A Color class has a constructor that accepts three integer parameters: red, green and blue components in the range of 0 ... 255
    6·1 answer
  • Create a report showing the Order ID, the name of the company that placed the order, and the first and last name of the associat
    12·1 answer
  • katniss dismisses effie's metaphor because, literally, she knows pearls cannot be created with pressurised coal,they come from w
    5·2 answers
  • You are the administrator for a small network. You have approximately 50 users who are served by a single Windows server. You ar
    7·1 answer
  • Write a program that, given an integer, sums all the numbers from 1 through that integer (both inclusive). Do not include in you
    8·1 answer
  • Which key doesn't relate to keyboard A:return key B :enrollment key C: delete key D:tab key
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!