1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ch4aika [34]
3 years ago
12

_________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio

n of replayed packets, and limited traffic flow confidentiality.
Computers and Technology
1 answer:
Sever21 [200]3 years ago
3 0

Answer:

IPSec

Explanation:

IPSec is an acronym for Internet Protocol Security. It is a standardized protocol used in determining the cryptographic and authenticated packets across the Internet Protocol networks.

It can be utilized to establish access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.

You might be interested in
What are the 3 rules of music<br><br> ps: there is no music subject so i had to put something else
Kitty [74]

Answer:

Rules that apply to all situations and accasions in the music room

Explanation:

I hope this helps

7 0
3 years ago
Read 2 more answers
A blank operates as a standalone device and is shared by multiple users
Sedbober [7]
B.s. Hugh gingham thigh hangman
8 0
3 years ago
Read 2 more answers
Patient letters created from __________ use structured data and do not require a large amount of typing from the medical assista
umka2103 [35]
Templates I think. not sure
3 0
3 years ago
Which of the following is a list of input devices?
charle [14.2K]
The Correct answer would be C. <span>microphone,mouse,scanner

microphone you talk into to give info (data)

a mouse you use to click on objects  to give input 

a scanner you input a paper/object 

hope this helps!! :)


</span>
7 0
3 years ago
Which of the following is the SECOND step of the intuitive​ lowest-cost method​?
coldgirl [10]

The very first step of the lowest cost method is to find the cell with the lowest cost in the entire matrix representing the cost of transportation along with supply and demand.

C. Find the cell with the lowest cost from the remaining​ (not crossed​ out) cells.

<u>Explanation:</u>

The second step in the lowest cost method is to allocate as many units as possible to that cell (having the lowest cost) without exceeding the supply or demand.

Then cross out the row or column (or both) that is exhausted by the assignment made. These two steps are further repeated until all the assignments are made and the total cost of transportation is calculated at the end.  

3 0
3 years ago
Other questions:
  • Ana works in the medical records department at a large medical office. Her job includes scanning and uploading medical records i
    15·1 answer
  • The statements that a programmer writes in a high-level language are called ________.
    9·2 answers
  • Can I change my brainly username?
    9·2 answers
  • Which feature is an interface between the user and the file system of a computer?
    6·2 answers
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • Once the data center routes to the destination server that hosts the website, whats the next step in the internet process?
    10·1 answer
  • The computer has had far-reaching effects on our lives.how has the computer effected your life?
    8·1 answer
  • Write an application that allows a user to enter any number of student quiz scores, as integers, until the user enters 99. If th
    5·1 answer
  • What is white light?
    12·2 answers
  • Pleaseeeee helpppppppp​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!