1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Umnica [9.8K]
4 years ago
6

Which mode of IPSec should you use to assure the integrity and confidentiality of data within the same LAN?a. AH promiscuous mod

e b. ESP transport mode c. AH Tunnel Mode d. ESP confidential
Computers and Technology
1 answer:
MaRussiya [10]4 years ago
5 0

Answer:

Option A i.e., AH promiscuous mode is the correct option.

Explanation:

In the following statement, AH promiscuous mode is that mode which is used by the Internet Protocol Security that encourage the integrity and also the confidentiality of the information within the same Local Area Network. So, that's why the AH promiscuous mode is the correct option to the given question.

You might be interested in
______ databases find the name and department name of all graduate students who work on projects that do not employ any other gr
yawa3891 [41]

Structured Query Language databases find the name and department name of all graduate students who work on projects that do not employ any other graduates from their department.

Explanation:

Structured Query Language (SQL) is a database-style intended for managing data kept in a relational database management system. SQL statements are applied to execute jobs such as update data on a database or recover data from a database. The standard SQL commands such as "Select", "Insert", "Update", "Delete", "Create", and "Drop" can be used to perform virtually everything that one requires to do with a database. According to ANSI (American National Standards Institute), it is the approved language for relational database management systems.

7 0
3 years ago
Python 4.5 code practice
Arada [10]

Answer:

add the question

Explanation:

3 0
3 years ago
If a menu item requires additional information from the user, the Windows standard is to place a(n) ____ at the end of the capti
elena-s [515]

Answer:

elipses

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the windows standard in this situation would be to place an ellipses at the end of the caption. This is because in the English language an ellipses (...)  usually indicates an intentional omission of a word or sentence, which in computer science is used to give the user an indication that it requires further user input.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
4 years ago
____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.
cupoosta [38]

Answer:

a. Leveling          

Explanation:

  • Leveling is also called decomposing.
  • It is a method to depict more detail in lower-level Data Flow Diagrams
  • It is the technique to expand or decompose DFDs into more details or levels to extract more information and identify all functional primitives until no further detail is required.
  • An information system can be comprised of multiple processes. Leveling partitions each process into sub-processes which identifies more details about the process with each level.
  • 0-level DFD: it starts with context diagram which depicts the whole system as a single process e.g. Grading system.
  • 1-level DFD: the context diagram is decomposed in this level. This means a single process is expanded into multiple processes which extracts more details about a process of a system.
  • 2- level DFD: this level decomposes the the process of level 1 going into further details.
  • This decomposition and expansion continues until no further details are required and all functional primitives are identified.
8 0
4 years ago
Name three situations when a copy constructor executes.
Vesna [10]

Answer:

1. When an object of the class is passed (to a function) by value as an argument.

2.  When an object is constructed based on another object of the same class.

3. When compiler generates a temporary object.

Explanation:

7 0
3 years ago
Other questions:
  • Why is Copyright important?
    5·1 answer
  • Create a single line comment that says ""Print results to screen""
    13·1 answer
  • Which of these components is a part of the central processing unit (CPU) of a computer? A. memory B. storage C. control unit D.
    8·2 answers
  • How does kinetic energy affect the stopping distance of a small vehicle compared to a large vehicle?
    14·2 answers
  • Is main memory fast or slow?
    9·1 answer
  • What is a google search query that will search for xml files on the domain example.Com
    8·1 answer
  • What is an important fact about databases?
    7·1 answer
  • What property must be set on a menu item to have the user activate that option by pressing Ctrl C on the keyboard
    11·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • Before you ever buy your first stock or bond, it's important to understand what type of investor you are. This depends on a numb
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!