1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
11

Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute

r and networking technologies. These documents are published by the Internet Engineering Task Force, the standards body for Internet engineering specifications. RFCs exist for hardware, operating systems, protocols, security services, and much more. It is an older protocol largely replaced by IPSec and SSL/ TLS-based VPNs in production environments, but it is still in use in some older environments. It is an early proprietary protocol from Microsoft. It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.
Computers and Technology
1 answer:
mr_godi [17]3 years ago
3 0

Answer:

It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

Explanation:

The characteristic relates to authentication header (AH) is that it is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

You might be interested in
Question is on the picture thank you
andreyandreev [35.5K]

I've included the spin and main method. I also included the public class. You can just ignore everything besides the spin method.

8 0
3 years ago
What are the basic tools for coding HTML manually?
Dimas [21]
The answer should be C, you need a text editor to write out the code, and then a web browser to view what the code creates.
8 0
3 years ago
Read 2 more answers
When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit.
Sergeeva-Olga [200]

Explanation:

Here's my solution:

import java.util.Scanner; // We start by importing the Scanner, which enables us to put in values

public class Main // our class. Name doesn't really matter here.

{ // Open the brackets of the class.

   

public static void main(String[] args) { // This is our main method. It will run when we run the class.

    System.out.println("Starting Taffy Timer..."); // When we start the timer, we will print out that we do so

 Scanner re = new Scanner(System.in); // Import the scanner into the main method

 int temp; // Define the integer called temperature that the user will put in

 do { /* This is a do while loop -- it will go through the loop, and then it will check the value.

      I decided to use this because we can define temperature without checking the value first.

     What this loop is doing is taking in the temperature, and then checking if it's right. If

     it's a high enough temperature, it will tell the user that it's ready, but if not, it won't. */

     temp = re.nextInt(); // Allow the user to enter in the temperature

     if(temp >= 270) { // if it's high enough, say that it's ready

         System.out.println("Your taffy is ready for the next step!");

         

     }

     else { // if not, don't

          System.out.println("The mixture isn't ready yet.");

         

     }

 }

 while(temp < 270); // This makes sure that if it's ready for the next step, we don't have to continue

}

}

5 0
3 years ago
William found out that someone used his report on American culture without his permission. What is William a victim of?
Mnenie [13.5K]

He is a victim of plagiarism.

Plagiarism is when someone steals someone else's work, to help benefit themselves. Taking credit for the other person work.

Hope this helps!

3 0
4 years ago
Read 2 more answers
What UDP port is used by a default WDS server setup when it is listening for PXE boot requests​
Vera_Pavlovna [14]
WDS uses Port 4011 to listen to PXE boot requests
8 0
3 years ago
Other questions:
  • Suppose you are given a data set consisting of nominal attributes, such as color, which takes values such as red, blue, green et
    9·1 answer
  • The overall visual look of a chart in terms of its graphic effects, colors, and backgrounds is the:
    5·1 answer
  • What is the term for a Web site that allows users to access and interact with software from any Internet-connected computer or d
    11·1 answer
  • An aerophone is an instrument that causes ________ to vibrate, thus creating sound waves.
    11·2 answers
  • ___________________ are aggregated collections of memory and cpu resources that can be shared among groups of virtual machines o
    11·1 answer
  • If all the data in a database is not physically located in one place, it would be a(n _______ database.
    5·1 answer
  • Explain any 10uses of computer that are specific to your field of study giving appropriate examples​
    13·1 answer
  • What does IDLE stand for
    11·2 answers
  • A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *
    13·1 answer
  • Francisco is becoming a dad for the first time. He feels relatively clueless about all things involving parenting and is looking
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!