How do cryptography-based keys ensure the validity of data
transferred across the network?






Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer




More Networking AllOther Interview Questions

which are the institutes in mumbai for CCNA training & how much is the cost of teaching and the exam fees?

0 Answers   Silicon,


Explain Any Standalnoe Application with rispect to OSI model, letus Consider Voice Recognition....!! One Has To tell function of all layers with rispect to given Application.

0 Answers   CMC,


What problems with the network you had had and how you solved it?

0 Answers   HCL,


When you look at a Cisco switch like Cisco 2950, why are the ports labeled with an 'X' behind the number? Like 1x, 2x.....23x, 24x, and what does it mean when there is no 'X'?

0 Answers  


how do u share printer through FTP(fire transfer protocol)?

0 Answers  


Difference between Network and Networking ?

1 Answers  


Can we extend the range of Wifi with the use of some softwares, if yes, which one? Or is there any hardware to do so, how much will it cost?

0 Answers  


What is Cold Boot and Warm Boot?

3 Answers   CMS,


what is buffering and flooding in NIC ?

0 Answers  


List out the main responsibilities of the network layer.

0 Answers  


What do you understand by the term ‘structured cabling’. State the main rules that should be used when installing a cable. 31. Show that maximum cabling area for LAN for horizontal cabling runs is approximately 200m.

0 Answers  


whtch file system support the tcp/ip , http protocal and ftp protocal?

0 Answers  




Categories
  • Networking Protocols (296)
  • Networking Administration (888)
  • Networking Security (70)
  • Networking AllOther (386)