How do cryptography-based keys ensure the validity of data
transferred across the network?

Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More Networking AllOther Interview Questions

Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if AS or TGS goes down?

1 Answers  

What is Beaconing?

3 Answers  

Give two examples of a ‘collision-free’ protocol ?

0 Answers  

What is meant by AT and ATX ?

3 Answers  

What is difference between ARP and RARP?

6 Answers   CTS,

What is binding order?

0 Answers  

Can anybody send me pls questions for Windows system administrator?

2 Answers  

What is your most recent experience with VERTAS backup software?

0 Answers  

What is the differnce between win 2000 server & win 2003 server?

1 Answers  

What is the Bandwidth of ethernet ?

5 Answers  

I want to known comparative networking features of windows and linux.

2 Answers  

What is Safe Mode?

2 Answers   TCS, Syntel,

  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (385)