1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
5

Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n

etwork analyzers from being able to read data in flight. What are considered as secure network protocols?
Computers and Technology
1 answer:
kotegsom [21]3 years ago
6 0

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

You might be interested in
In _____ conversion of the implementation phase of the systems development life cycle (SDLC), the old and new systems run simult
coldgirl [10]

Answer:

b. parallel

Explanation:

According to my experience on information technology, I can say that based on the information provided within the question the term being mentioned is called Parallel Conversion. Like mentioned in the question this term refers to when two systems run at the same time while transferring operations in order to make sure that everything is running correctly and are outputting the same results.

If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Which of the following techniques would a Baroque composer most likely employ to evoke an affect of agitation? Select one:
frez [133]

Answer:

b. Rubato tremolo

Explanation:

Tremolo is a modulation effect that imposes a rhythmic change in volume of sound. Once discovered in electric amplifier circuits, sound engineers and composers like the Baroque now use this low frequency oscillating modulation technique to create emotional piercing effect on their audience to maintain focus.

The low frequency tremolo can be gotten from the vibrating string in guitars, violins etc, and vocal sound, it is also produced from electronic devices created for its purpose. they are called optical tremolo.

5 0
3 years ago
Which of the following is the most abstract?
marysya [2.9K]

D. The word "food" is the most abstract because it is the least specific and does not specify what food it is exactly.

Hope this helps!! :)

4 0
3 years ago
Read 2 more answers
Pleeeese help me for these questions
geniusboy [140]

1 Account

2 online

3 access

4 password

5 internet

6 email

4 0
3 years ago
Which tool do you think would be the most useful if you were designing a logo for a business?
Maurinko [17]

Answer:

maybe a computer would be helpful

6 0
3 years ago
Read 2 more answers
Other questions:
  • "which part of an information system consists of the rules or guidelines for people to follow?"
    9·1 answer
  • What file format can excel save files as
    10·1 answer
  • Which of the following expansion ports would be used to enable transfer of power, data, and video to peripheral devices on an Ap
    7·1 answer
  • 5. Drawing Conclusions If you were a person in
    10·1 answer
  • What is a specific naming convention important in regards to your file management system<br> ?
    7·1 answer
  • Create the SQL statements for displaying the results for each of the following scenarios in the Academic Database. Save these st
    13·1 answer
  • Once you resize a photograph, it cannot be returned to its original size. TRUE or FALSE
    8·1 answer
  • On his computer desktop, Rodney can see several different files, each immediately accessible. Because he is actively working on
    13·1 answer
  • Define Turbo C++ and how is the use of Turbo C++.?
    15·1 answer
  • What are the benefits and drawbacks of a desktop utilising virtualisation and a server?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!