1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
11

Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute

r and networking technologies. These documents are published by the Internet Engineering Task Force, the standards body for Internet engineering specifications. RFCs exist for hardware, operating systems, protocols, security services, and much more. It is an older protocol largely replaced by IPSec and SSL/ TLS-based VPNs in production environments, but it is still in use in some older environments. It is an early proprietary protocol from Microsoft. It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.
Computers and Technology
1 answer:
mr_godi [17]3 years ago
3 0

Answer:

It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

Explanation:

The characteristic relates to authentication header (AH) is that it is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

You might be interested in
Both aliases and functions can be used to store commands that can be executed, but functions can also accept positional paramete
Aliun [14]

Answer:

The answer is "True".

Explanation:

  • Alias command is normally used for shortening or chain terminal commands with each other. These commands include many shells that are ash, bash, csh, and ksh. The purpose is to use these commands is read and execute commands.  
  • A function is a group of statements that are used to perform a specifics task. In other words, we can say that a function will take values that are passed by the user and somehow manipulate those values for executing commands and function parameters are known as positional parameters.

6 0
3 years ago
What are some ways you can give staying off your phone a "boost" and make it easier to do?
Arte-miy333 [17]

Answer:

go do something outside and leave your phone inside to charge

Explanation:

7 0
3 years ago
Which of the following Access objects provides a user-friendly data entry method?
Rina8888 [55]

Answer:

Table

Explanation:

Microsoft Access uses an object called a _____ to enter and organize data.

The answer is table.

6 0
2 years ago
Jeanne writes a song, and Raul wants to perform
Goryan [66]
B) ask jeanne for permission
6 0
3 years ago
Read 2 more answers
Yall tryna play gta later? I play on ps4
iVinArrow [24]

Answer:

xbox tho

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • Calculated fields can be entered in queries. What row should you type a calculated field in?
    13·1 answer
  • Which answer best describes an unsubsidized federal loan
    9·1 answer
  • How many buttons does a gamecube controller have?
    7·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • How do you customize Track Changes in a text document?
    11·1 answer
  • Adobe reader is a type of​
    14·2 answers
  • Which among the following choices is correct based on the two statements listed below? Statement 1: When the lexical analyzer sc
    12·1 answer
  • Some people recommend deleting social media accounts because of the troubling legal and ethical implications of social media. Do
    9·1 answer
  • Vẽ sơ đồ DFD cho của hàng bán điện thoại ( Môn phân tích và thiết kế hệ thống thông tin)
    10·1 answer
  • The process of getting listing information displayed on numerous other websites is:________
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!