1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
5

Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n

etwork analyzers from being able to read data in flight. What are considered as secure network protocols?
Computers and Technology
1 answer:
kotegsom [21]3 years ago
6 0

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

You might be interested in
Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class S
Nadusha1986 [10]

Answer:

By using dependency injection, create the adapter to adapt both the DataViz and the UberStats interface as expected.

Explanation:

Adapters are used in Objected-oriented programming to run or convert the output of one class object to another. The DataViz class currently uses the SuperStats class as an adaptee to get and output statistical results.

Write a new code from the scratch is tedious, so, the UberStats class dependencies are injected in the adapter and the DataViz and UberStats class functionalities can be experimented with.

4 0
3 years ago
Janice usually works on a particular workbook. She decides to keep a backup of all the data in a separate workbook. She opens a
likoan [24]
She would use Ctrl and C bc thats the copy short cut

Ctrl and v is pasting
Ctrl and a is selecting all text and 
Ctrl and z is for cutting the text
4 0
3 years ago
Read 2 more answers
Alcohol does not affect the driver judgement
zysi [14]
It does affect. Your judgment
6 0
3 years ago
Read 2 more answers
A new protocol for new information distribution proposed by CERN became the world wide wed in 1991.
Veseljchak [2.6K]
The answer to this is  true



3 0
3 years ago
Draw a flowchart for an algorithm which calculates how much money a student will need per week to buy a meal and two drinks each
jasenka [17]

Flowcharts are used as a prototype of an actual program.

First, I will write out the algorithm; which will be used as an explanation of the flowchart (see attachment for flowchart)

The algorithm is as follows;

1. Start

2. Get input for cost of a meal and cost of a drink;

3. Calculate the total cost for a meal and two drinks

4. Multiply the total cost of a meal and two drinks by 7, to get the weekly cost

5. Display the weekly cost

6. Stop

At the end of the algorithm/flowchart, the weekly cost is calculated and printed.

See attachment for flowchart

Read more about algorithms and flowcharts at:

brainly.com/question/18088572

3 0
3 years ago
Other questions:
  • Which of the following is an extension of the fill pattern Sunday,Tuesday?
    10·2 answers
  • In a digital drawing program, when an object is highlighted, boxes appear at the sides and corners. These boxes can be grabbed a
    13·1 answer
  • What is output with the statement System.out.println(x+y); if x and y are int values where x=10 and y=5? Group of answer choices
    10·1 answer
  • A _______ record is responsible for resolving an ip to a domain name.
    9·1 answer
  • write a 〕ava program to sort a random list of 10 numbers entered b y user in an array using Selection Sort technique
    5·1 answer
  • Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class.
    10·1 answer
  • Write code to simulate the following differential equation for x ranging from 0 to 5. Assume y = 0 when x = 0. Plot y vs. x usin
    11·1 answer
  • Ten output devices you know
    10·1 answer
  • You're as smooth as Tennessee whiskey
    8·2 answers
  • Please help 2 lazy to do! easy question
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!