How do cryptography-based keys ensure the validity of data
transferred across the network?

Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More Networking AllOther Interview Questions

Why is a data link layer switch preferred over a hub ?

0 Answers  

TCP/IP can work on a)ethernet b)tokenring c)a&b d)none

2 Answers  

What is Device Manager?

1 Answers  

Why TCP and IP are written all together as TCP/IP?

8 Answers   Sutherland, KPIT,

i want to known about the ubuntu enumerate the various costs associated with the performance, security, support, and maintenance Thanks. please reply the

0 Answers  

What is Norton Ghost? How do i create a bootable disc?

1 Answers  

Hi Can anybody tell me how I can get CCNA certificate for beginners

1 Answers  

An alternative to LAN is simply a big timesharing system with terminals for all users. Give two advantages of a client-server system using a LAN.

1 Answers   Allied Group, Columbia College,

Which layer is used to detect and correct errors

0 Answers  

What is your most recent experience with VERTAS backup software?

0 Answers  

how can use the process id in ospf?

0 Answers   TCS, Wipro,

Which is the protocol used in ethernet. (CSMA/CD) Why is it called so ?

2 Answers  

  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (385)