1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
4 years ago
11

Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute

r and networking technologies. These documents are published by the Internet Engineering Task Force, the standards body for Internet engineering specifications. RFCs exist for hardware, operating systems, protocols, security services, and much more. It is an older protocol largely replaced by IPSec and SSL/ TLS-based VPNs in production environments, but it is still in use in some older environments. It is an early proprietary protocol from Microsoft. It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.
Computers and Technology
1 answer:
mr_godi [17]4 years ago
3 0

Answer:

It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

Explanation:

The characteristic relates to authentication header (AH) is that it is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

You might be interested in
How does a fully integrated Data and Analytics Platform enable organizations to convert data into consumable information and ins
loris [4]

Answer: How are you

Explanation:como estas meaning

3 0
3 years ago
What is performance? Multiple Choice measures how quickly a system performs a process or transaction a system that is not operat
Lilit [14]

Answer: measures how quickly a system performs a process or transaction

Explanation:

Computer performance refers to how well a given computer system performs, which is estimated by its accuracy, efficiency and speed when completing a process or transaction.

A computer performance evaluation will assess a system's resources and outputs to make sure that it´s performing in the best possible way.

Some parameters of performance are latency, speed, throughput, and bandwidth.

8 0
4 years ago
Read 2 more answers
PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
Anettt [7]

def even_checker(lst):

   for x in lst:

       if x%2==0:

           print(x)

l = [1,2,3,4,5,6,7,8,9,10]

even_checker(l)

I wrote my code in python 3.8. I hope this helps.

3 0
3 years ago
Generally, what is the term for storage locations in a processor?
oksano4ka [1.4K]

Answer: Registers

Explanation:

Registers are small storage locations identified by different types of registers. The function of the register is to provide data for immediate processing to the CPU. These registers hold data temporarily and provide easy access of data to the processor.

6 0
3 years ago
How to calculate standard deviation on excel?
Anarel [89]
<span>I believe you use the Excel Formula =STDEV( ) and select the range of values which contain the data. This calculates the sample standard deviation (n-1).</span>
5 0
3 years ago
Other questions:
  • Two electronics students are discussing electrical units. Student A says that electrical power is measured in units called coulo
    5·1 answer
  • OSHA requirements state that employees must have eye or face protection if their work exposes them to hazards such as:
    8·1 answer
  • George writes code for word processing applications. He is looking for a new job opportunity. What position should George look f
    5·2 answers
  • In the Word 2016 window, where is the Status bar located?
    11·1 answer
  • 1) Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a s
    11·1 answer
  • can Results shown at the top of the Google search engine results page (SERP) always get high Needs Met ratings
    10·1 answer
  • Used for monitoring web activity by users to make sure that sensitive information won't leave the building.
    7·1 answer
  • Your iphone is not configured to allow calls using this mac
    10·1 answer
  • Which of the following is not a secondary memory. (a) pen drive (b) Hard disk (c) Ram (d) Magnetic disk
    8·1 answer
  • Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!