How do cryptography-based keys ensure the validity of data
transferred across the network?



How do cryptography-based keys ensure the validity of data transferred across the network?..

Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    7 Yes 0 No

Post New Answer

More Networking AllOther Interview Questions

what is Voltage levels of rs232x?

0 Answers  


Differentiate between ISO-OSI and TCP/IP reference model.

1 Answers  


A binary signal is sent over a 3-khz channel whose signal-to-noise ratio is 20 db.Calculate the maximum achievable data rate ?

0 Answers  


give an example of bus type network.

0 Answers  


What is pool in networking?

0 Answers  






Explain network equipment used in wired-LANS and explain the function of Hub, Switch, and bridge.

0 Answers  


how to increase the ping packet size from 32 bytes to more bytes ?

5 Answers  


Which layer is used to run services like FTP, Telnet etc.

0 Answers  


What is Brouter? and what is the advantages and dis advantages of Brouters?

2 Answers  


what is dhcp server?

4 Answers  


voltage levels of rs232c

1 Answers   Verifone,


cat 5E cable with brown colour cable what will be its speed in kbps for internet?

0 Answers   Airtel,


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)