1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
11

Explain the purpose behind DNSSEC. How does it use cryptography to secure network traffic? How is it used by organizations to en

sure network security?
Computers and Technology
1 answer:
AlexFokin [52]3 years ago
8 0

Answer: DNSSEC(Domain Name System Security Extensions) is the used for protection of the applications by signing the DNS data records in digital form.The purpose of the DNSSEC is to validate the DNS signatured area.

DNSSEC is used for securing the traffic by providing access to the authorized party only .Cryptography is a useful tool for the securing the network traffic make the traffic of the networks hidden which make it safe from attacks and hacks.Traffic encryption mechanism is used in many field to protect the transmission from theft.The digitally signed transaction can be viewed or decrypted by only authorized by when required and thus manages the traffic.

 E.g.- bank uses this technology while transactions take place to make it secure.

You might be interested in
What would happen if computers only had input peripherals and a CPU?
lisov135 [29]
Then there would be no way to see the output based off what you input. =)
3 0
3 years ago
Matt Cooper of Soggy Bottom Canoe and Kayak Rental refers to concept testing as​ _____ testing.
andrezito [222]

Answer:

Beta

Explanation:

Beta testing is a Quality Assurance process, where Developers and testers evaluate the quality of application experience from the point of view of the users, who are the most important targets of any software product.

5 0
4 years ago
Python's open function, which expects a file pathname and a ____ string as arguments, opens a connection to the file on disk and
seraphim [82]
Hi!

In pythons <em>open() </em>function, we need to insert a file pathname and a mode. The mode is basically saying how you want to <em>open </em>the file.

Hopefully, this helps! =)
6 0
3 years ago
After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to
patriot [66]

Answer:

A. Containment

Explanation:

  • This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent.
  • Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly.
  • Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.
5 0
4 years ago
Define the following terms: Line authority,in your own words.
konstantin123 [22]
The power given to a person in a supervisory position who makes decisions and actions by subordinates. An engineer manager is an example of like authority.
7 0
3 years ago
Other questions:
  • What term is used to describe a chipset developed and promoted by the U.S. government from 1993 to 1996 as an encryption device
    9·1 answer
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Chevening is looking for individuals with strong professional relationship building skills, who will engage with the Chevening c
    15·1 answer
  • If we want to access files located in a directory on a remote server, which of these options would we use?
    9·2 answers
  • The Operating System provides utility software designed to perform specific tasks. What task(s) does it perform? Select all that
    11·1 answer
  • 6. When working with a file,
    9·1 answer
  • What happens to a message when it is deleted?
    11·1 answer
  • Dose anyone know how to change username, grade level, and gender here? I have tried it in the change preferences and it says it
    8·2 answers
  • What is a web client ​
    6·2 answers
  • Why is color important for all objects drawn ?​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!