How do cryptography-based keys ensure the validity of data
transferred across the network?

Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More Networking AllOther Interview Questions

what are the major componets of client server application?

0 Answers   SoftTech, NGOS,

NFS server + Solaris client + Linux client, all connected at GigE to the same switch. The Linux client is fast but the Solaris client is slow. Explain troubleshooting steps

1 Answers   ABC,

Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if AS or TGS goes down?

1 Answers  

Why does ATM use the cell of small and fixed length ?

0 Answers  

Tell an example of bus type network.

3 Answers   Honeywell,

What are the advantages and disadvantages of switch

13 Answers   IBM, Cisco,

a node has the ip address and But it is transmitting data from node1 to node2 only. The reason may be a)a node cannot have more than one address b)class A should have second octet different c)classB " " " " " d)a,b,c

1 Answers  

Enumerate the main responsibilities of data link layer ?

0 Answers  

What is socket and server socket?

1 Answers   HP,

what is scsi?. what we do if scsi/scsi drive failed?.

0 Answers  

Assume you have to build 30 systems (mix of Solaris + Linux) in a brand new place (ie: no existing infrastructure). How do you tackle this?

0 Answers  

what is Brouter?

3 Answers   Wipro,

  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (385)