How do cryptography-based keys ensure the validity of data
transferred across the network?






Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer




More Networking AllOther Interview Questions

what is web server,application server,database server

1 Answers  


FEW PORTS GET BLOCKED IN CISCO SWITCHES, CAN ANYONE TELL HOW TO UNBLOCK THIS PORTS

6 Answers  


What is a NIC?

3 Answers  


Could u Pl. explain all the 7 layers of network?

1 Answers  


How to make a port to a dedicated port through dll registration in a windows system

0 Answers  


What do you mean by link to link layers of OSI reference model? Explain their functions briefly?

0 Answers  


Coaxial Cable?

1 Answers  


what is basic of networkin ?2.what is main topik of networkin ? 3.how installed the software and drivers ? 4. how to connect the pc and net?5.what uses of protocol in networking,and tell main proto of netwo

0 Answers   HP, CMS,


Am planning to do a course on Remote Infrastructure Management.Is it a good field. And one more thing. Am planning to join Talent Sprint, Hyd. How good is this institute. Please help fast

0 Answers  


Expand IDEA?

1 Answers  


how can give permission with acl in numeric mode not in aplhabetical mode

2 Answers   SoftSol,


TCP/IP MODEL AND ITS RELATIVE DIFF WT OSI MODEL??????????

1 Answers   IBM,




Categories
  • Networking Protocols (295)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (385)