Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Quearn

Quearn Logo Quearn Logo

Quearn Navigation

  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Quearn Academy
  • About Us
  • Blog
  • Contact Us
Home/transport layer

Quearn Latest Questions

VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

Which of the following organizations is primarily concerned with military encryption systems? a) NSA b) NIST c) IEEE d) ITU

  • 0

ittransport layer
  • 3 Answers
  • 11 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

In computer security _______ means that the information in a computer system only be accessible for reading by authorized parities. a) confidentiality b) integrity c) availability d) authenticity

  • 0

ittransport layer
  • 2 Answers
  • 5 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

n computer security _______ means that computer system assets can be modified only by authorized parities. a) confidentiality b) integrity c) availability d) authenticity

  • 0

ittransport layer
  • 2 Answers
  • 5 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

IP Security operates in which layer of the OSI model? a) Network b) Transport c) Application d) Physical

  • 0

ittransport layer
  • 5 Answers
  • 10 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

ESP does not provide ________ a) source authentication b) data integrity c) privacy d) error control

  • 0

ittransport layer
  • 6 Answers
  • 12 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

IPsec defines two protocols: _______ and ________ a) AH; SSL b) PGP; ESP c) AH; ESP d) PGP; SSL

  • 0

ittransport layer
  • 4 Answers
  • 10 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

______ provides authentication at the IP level. a) AH b) ESP c) PGP d) SSL

  • 0

ittransport layer
  • 3 Answers
  • 7 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

Which two types of IPsec can be used to secure communications between two LANs? a) AH tunnel mode b) ESP tunnel mode c) Both AH tunnel mode and ESP tunnel mode d) ESP transport mode

  • 0

ittransport layer
  • 3 Answers
  • 7 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? a) Kerberos V5 b) SHA c) MD5 d) Both SHA and MD5

  • 0

ittransport layer
  • 3 Answers
  • 7 Views
Answer
VARISHA PARVEZ
  • 0
VARISHA PARVEZ
Asked: May 22, 2023In: Computer Network

Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN? a) AH transport mode b) ESP transport mode c) ESP tunnel mode d) AH tunnel mode

  • 0

ittransport layer
  • 2 Answers
  • 6 Views
Answer
Load More Questions

Sidebar

Ask A Question
  • Popular
  • Answers
  • imran

    Point out the wrong statement. A. The standard instances are ...

    • 282 Answers
  • imran

    Point out the correct statement. A. A volume is mounted ...

    • 259 Answers
  • VARISHA PARVEZ

    Which type of e‐commerce focuses on consumers dealing with ...

    • 181 Answers
  • krati jain
    krati jain added an answer D. occupies only the size it needs and not the… June 9, 2023 at 6:44 pm
  • monoshwinee
    monoshwinee added an answer A. loss of profit June 9, 2023 at 6:44 pm
  • krati jain
    krati jain added an answer D. all of the above June 9, 2023 at 6:44 pm

Top Members

Bhavitha27

Bhavitha27

  • 0 Questions
  • 0 Answers
Sayali

Sayali

  • 1 Question
  • 0 Answers
Prince874

Prince874

  • 0 Questions
  • 0 Answers

Trending Tags

account algorithm analytics answer c computer computer science python cs e commerce electric electronics it language mcq mechanical physics poll programming python question

Explore

  • Home
  • Quearn Academy
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help

Footer

Quearn

Quearn is a social questions & Answers Engine which will help you establish your community and connect with other people, Also you Can Earn Money.

About Us

  • Meet The Team
  • Blog
  • About Us
  • Contact Us

Legal Stuff

  • Terms of Use
  • Privacy Policy
  • Cookie Policy

Help

  • Knowledge Base
  • Support

Follow

© 2018-2023 Quearn®. All Rights Reserved | Developed by ASHAS Industries Proudly 🇮🇳