1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
14

What udp port is used for i k e traffic from vpn client to server?

Computers and Technology
1 answer:
Reil [10]3 years ago
6 0
<span>Ports are used to distinguish among multiple destination processes in a single host computer.</span>
UDP (User Datagram Protocol)<span> port 500 is used for i k e traffic from VPN client to server.
</span><span>This port is used during the establishment of secure VPN tunnels.
</span>
You might be interested in
I dont know how to put the negative sigh on my computer
valina [46]
You put the dash on the right side up top ape
8 0
3 years ago
Read 2 more answers
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
mars1129 [50]
E-text <span>is digital textual information that can be stored, manipulated, and transmitted by electronic devices. The term "e-text" stands for electronic text and it is used for any digital document written, read, transmitted or manipulated by electronic devices, such as smart phones, PCs, tablets,...The origins of the e-text are in the beginning of the Internet.</span>
7 0
3 years ago
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
4 years ago
Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
Lisa [10]

Answer:

Transport Layer

Explanation:

The transport layer which is responsible for end-to-end communication over a network. Transport Layer breaks the data, allocated by Application layer in smaller units called segments. It is used to number every byte in the segment. It is also responsible for error correction and provides reliability to the user. It allows the host to send and receive error corrected data, messages or packets  over a network and ensures  that data should be received in the same sequence in which it was sent.  It also enables multiplexing and flow control.

7 0
3 years ago
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
Other questions:
  • _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a we
    9·1 answer
  • Deterime the minimum number of multiplication operations needed to compute the following. Show the order of the computations.
    10·1 answer
  • The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs
    10·1 answer
  • What system of representation is used for the threaded portions
    12·1 answer
  • Explain how the operating system controls the software and hardware on the computer?
    5·1 answer
  • In C, how could I use a command line input to remove certain characters from an existing string? For example, if I have string '
    8·1 answer
  • Why is science, mathematics, and technology different from engineering?
    15·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!