1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
7

Which type of protocol allows for a secure data transmission using encryption methods?

Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
5 0

Answer:

The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection

You might be interested in
Which activity is performed during high-level design in the V-model?
SVETLANKA909090 [29]

Answer:

understanding component interaction

4 0
3 years ago
Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.
Nitella [24]

Answer:

False

Explanation:

They are not applied in the hardware and software of information systems.

3 0
3 years ago
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
Could you help be advanced in tech?
Amiraneli [1.4K]
Yes I can help you if you go to google or bing type In the question you have and click enter you will get the answer

P.S if it doesn't try to type it more clear
6 0
3 years ago
Wassup everyone. what are you up to ?
ASHA 777 [7]

Answer:

Today is my birthday

Explanation:

And I'm very excited

6 0
3 years ago
Read 2 more answers
Other questions:
  • For a set of integers stored in an array,calculate the sum of the positive numbers and the sum of the negative numbers. The prog
    10·1 answer
  • When sending emails and setting goals, you want to go beyond checkpoints of activities for your goals. What are examples of chec
    12·1 answer
  • What is the name of google's mobile operating system, used on smartphones and tablets from many manufacturers?
    6·1 answer
  • Which statement demonstrates a conflict of interest in an organization?
    9·1 answer
  • Create an application named TurningDemo that creates instances of four classes: Page, Corner, Pancake, and Leaf. Create an inter
    7·1 answer
  • What were second generation languages that required detailed knowledge of the computer's hardware and a lot of spare time to wri
    11·1 answer
  • Problem # 1 [End of chapter problem] The following character encoding is used in a data link protocol: A: 01100111 B: 11110011 F
    14·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • True or false with reason :- carriage inword is carriage on purchases​
    6·1 answer
  • Which document outlines the activities carried out during testing?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!