How do cryptography-based keys ensure the validity of data
transferred across the network?






Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer




More Networking AllOther Interview Questions

Why is a data link layer switch preferred over a hub ?

0 Answers  


TCP/IP can work on a)ethernet b)tokenring c)a&b d)none

2 Answers  


What is Device Manager?

1 Answers  


Why TCP and IP are written all together as TCP/IP?

8 Answers   Sutherland, KPIT,


i want to known about the ubuntu enumerate the various costs associated with the performance, security, support, and maintenance Thanks. please reply the saiwoontip9@gmail.com

0 Answers  


What is Norton Ghost? How do i create a bootable disc?

1 Answers  


Hi Can anybody tell me how I can get CCNA certificate for beginners

1 Answers  


An alternative to LAN is simply a big timesharing system with terminals for all users. Give two advantages of a client-server system using a LAN.

1 Answers   Allied Group, Columbia College,


Which layer is used to detect and correct errors

0 Answers  


What is your most recent experience with VERTAS backup software?

0 Answers  


how can use the process id in ospf?

0 Answers   TCS, Wipro,


Which is the protocol used in ethernet. (CSMA/CD) Why is it called so ?

2 Answers  




Categories
  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (385)