How do cryptography-based keys ensure the validity of data
transferred across the network?






Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer




More Networking AllOther Interview Questions

What is your expertise with SymCLI? ( a few command-specific questions may follow)

0 Answers  


how to configure a Network Printer ??

4 Answers  


What are two characteristics of clients in data networks?

1 Answers   Cisco,


Differentiate between SMTP and SNMP

0 Answers  


What is an Operating System?

2 Answers   Suzlon,


What is APIPA?

3 Answers   HCL,


How the code in popup card number(SIM recharge card number) will be unique?How they designed?What is the formula?Please answer me?

0 Answers   Excel,


How to create dynamic users on simple Asterisks server for simple extension based x-change?

0 Answers   HCL,


What is the basic requirement of a real-time network ?

7 Answers   Honeywell,


Who developed the UNISHA. and why they cannot continued this software?

0 Answers  


Differentiate between static and dynamic channel allocation.

0 Answers  


What is the Command Used to Convert a StandAlone PC into Domain Controller?

4 Answers  




Categories
  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (386)