How do cryptography-based keys ensure the validity of data
transferred across the network?






Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer




More Networking AllOther Interview Questions

Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if AS or TGS goes down?

1 Answers  


What is Beaconing?

3 Answers  


Give two examples of a ‘collision-free’ protocol ?

0 Answers  


What is meant by AT and ATX ?

3 Answers  


What is difference between ARP and RARP?

6 Answers   CTS,


What is binding order?

0 Answers  


Can anybody send me pls questions for Windows system administrator?

2 Answers  


What is your most recent experience with VERTAS backup software?

0 Answers  


What is the differnce between win 2000 server & win 2003 server?

1 Answers  


What is the Bandwidth of ethernet ?

5 Answers  


I want to known comparative networking features of windows and linux.

2 Answers  


What is Safe Mode?

2 Answers   TCS, Syntel,




Categories
  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (385)