How do cryptography-based keys ensure the validity of data
transferred across the network?






Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer




More Networking AllOther Interview Questions

what are the major componets of client server application?

0 Answers   SoftTech, NGOS,


NFS server + Solaris client + Linux client, all connected at GigE to the same switch. The Linux client is fast but the Solaris client is slow. Explain troubleshooting steps

1 Answers   ABC,


Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if AS or TGS goes down?

1 Answers  


Why does ATM use the cell of small and fixed length ?

0 Answers  


Tell an example of bus type network.

3 Answers   Honeywell,


What are the advantages and disadvantages of switch

13 Answers   IBM, Cisco,


a node has the ip address 138.50.10.7 and 138.50.10.9. But it is transmitting data from node1 to node2 only. The reason may be a)a node cannot have more than one address b)class A should have second octet different c)classB " " " " " d)a,b,c

1 Answers  


Enumerate the main responsibilities of data link layer ?

0 Answers  


What is socket and server socket?

1 Answers   HP,


what is scsi?. what we do if scsi/scsi drive failed?.

0 Answers  


Assume you have to build 30 systems (mix of Solaris + Linux) in a brand new place (ie: no existing infrastructure). How do you tackle this?

0 Answers  


what is Brouter?

3 Answers   Wipro,




Categories
  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (385)