1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
5

Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n

etwork analyzers from being able to read data in flight. What are considered as secure network protocols?
Computers and Technology
1 answer:
kotegsom [21]3 years ago
6 0

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

You might be interested in
Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates wh
Setler79 [48]

The loop terminates when "xxxxx" is read in. If the word is land, the string followed by "land" get outputted. The same with air, and water.

Explanation:

int land = 0;

int air = 0;

int water = 0;

String word = "";

while(!(word.equals("xxxxx"))) {

word = stdin.next();

if(word.equals("land")) {

   land++;

}else if(word.equals("air")) {

   air++;

}else if(word.equals("water")) {

   water++;

}  

}

System.out.println("land:" + land);

System.out.println("air:" + air);

System.out.println("water:" + water);

5 0
3 years ago
A ________ allows users to add, remove, or edit its content.
Amanda [17]
Wiki is the correct answer
4 0
3 years ago
Read 2 more answers
The U.S. consumes lots of energy. Which fuel provides the most energy?
Nadya [2.5K]

Answer:

<em>Natural</em><em> </em><em>Gas</em>

Explanation:

..............

7 0
3 years ago
Read 2 more answers
_____ is confirming the significance of what another person is feeling.
il63 [147K]

Validation: Understanding and showing acceptance for another person                

4 0
3 years ago
Read 2 more answers
Network convergence refers to using a single_______________.
CaHeK987 [17]

Answer:

Network, vendor, and bill.

Explanation:

Network convergence is a term used in communication networking that describes the productive synergy among telephone, video, and data transmission using a single network, vendor, and a bill. It enables usage of numerous devices and numerous services with single network, vendor, and bill.

Hence, in this case, it can be concluded that, Network convergence refers to using a single network, single vendor, and single bill.

7 0
4 years ago
Other questions:
  • Which of the following might an early 20th -century film producer do in order to draw an audience?
    13·1 answer
  • what aspect should you consider before adding pictures to a document? you should structure the first before you search for a rel
    15·2 answers
  • All of the following are forms of verbal communication except
    12·2 answers
  • .The __________ comes in handy when I'm using Microsoft Word to type an essay with a specific word number requirement
    6·1 answer
  • In his article “is google making up stupid” Nicholas Carr uses a metaphor to suggest that
    11·2 answers
  • What is a traffic controller?what are its functions?
    13·1 answer
  • 27. If X and Y are int type variables,
    14·1 answer
  • Ha Yoon sees funny quotes on top of images frequently in her social media feed. One day, she has an idea for one of her own. Whi
    11·1 answer
  • What is the difference between algorithm and program?
    10·1 answer
  • Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!