1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
11

Which of the following characteristics relates to authentication header (AH)? It is a document that defines or describes compute

r and networking technologies. These documents are published by the Internet Engineering Task Force, the standards body for Internet engineering specifications. RFCs exist for hardware, operating systems, protocols, security services, and much more. It is an older protocol largely replaced by IPSec and SSL/ TLS-based VPNs in production environments, but it is still in use in some older environments. It is an early proprietary protocol from Microsoft. It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.
Computers and Technology
1 answer:
mr_godi [17]3 years ago
3 0

Answer:

It is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

Explanation:

The characteristic relates to authentication header (AH) is that it is a protocol that provides integrity protection for packet headers and data, as well as user authentication.

You might be interested in
Assume the existence of a Window class with a function getWidth that returns the width of the window. Define a derived class Win
Pepsi [2]

Answer:

Following are the code in the C++ Programming Language.

//define class and inherited the parent class

class WindowWithBorder : public Window

{

//access modifier

private:

//set integer variable

int borderWidth;

//set integer variable

int windowWidth;

//access modifier

public:

//definition of the constructor that accept an integer type argument

WindowWithBorder(int);

//definition of the function

int getUseableWidth();

};

//set constructor outside the class

WindowWithBorder::WindowWithBorder(int y)

{

//initialization in integer variable from function

windowWidth = getWidth();

//initialization in integer variable from the argument list

borderWidth = y;

}

//set function from outside the class

int WindowWithBorder::getUseableWidth()

{

//return output

return windowWidth - borderWidth;

}

Explanation:

Here we define a class "WindowWithBorder" which inherit their parent class "Window", inside the class.

  • Set two integer data type private variables "borderWidth" and "windowWidth".
  • Write the definition of the "windowWidth" class constructor that accept the integer type argument list.
  • Write the definition of the function "getUseableWidth()" which is integer type.

Then, we define constructor outside the class which accept the integer type argument list "y" inside it.

  • we initialize in the variable "windowWidth" from the function "getWidth()".
  • Initialize in the variable "borderWidth" from the argument of the constructor.

Finally, we define function in which we perform the subtraction of the variable "windowWidth" from the variable "borderWidth" and return it.

5 0
3 years ago
1 There are several applications to assist you to surf through the internet, mention
prohojiy [21]
Email
Web browsing
Peer-to-peer services
3 0
3 years ago
In 1928 what film was the first all talking feature
goblinko [34]

Lights of New York was the 1928 what film was the first all talking feature.

8 0
3 years ago
Which action will help you protect data in computer in case of an earthquake?
Dennis_Churaev [7]

Answer:

having a backup disk or storing the information in the cloud

Explanation:

7 0
3 years ago
A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the wa
goblinko [34]
I think it is a virus
5 0
3 years ago
Other questions:
  • How useful is the creation of folders for your computer
    9·1 answer
  • Review the given requirements using the checklist and discover possible problems with them. The following requirements are for a
    8·1 answer
  • Pamela finds that she is constantly spelling the word “color” as “colour” when she is typing. Even though this is how the word i
    11·1 answer
  • How do I use this without the spring?
    6·1 answer
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·2 answers
  • Software applications called _____ provide the means to record information that passes through a computer or router that is hand
    10·1 answer
  • Which of the following is productivity strategy for collaboration?
    6·1 answer
  • I neeeeeeeeeeeddddddddddddd help plz ppl
    10·2 answers
  • Learning in a digital environment is also called [blank] learning.
    11·2 answers
  • What does the "zoom tool" do in Photoshop?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!