How do cryptography-based keys ensure the validity of data
transferred across the network?



How do cryptography-based keys ensure the validity of data transferred across the network?..

Answer / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    7 Yes 0 No

Post New Answer

More Networking AllOther Interview Questions

What is the advantage of Ring network ?

4 Answers   Honeywell,


What is tdm?

0 Answers   Maveric,


A binary signal is sent over a 3-khz channel whose signal-to-noise ratio is 20 db.Calculate the maximum achievable data rate ?

0 Answers  


What is the baud rate of a standard 10 mbps Ethernet LAN ?

0 Answers  


What is difference between ARP and RARP?

6 Answers   CTS, Elgi Equipments,






What are the two reasons for using layered protocols?

0 Answers  


Does Ethernet 10Gbps support multiple access

0 Answers  


Compare the maximum window size in go-back-N and selective-repeat ARQs.

0 Answers  


Checksum in IP packet is

3 Answers   Hughes,


What MAU?

0 Answers   Elgi Equipments, MCN Solutions,


How to identify HUB and SWITCH, without connecting to network? Is it possible?

2 Answers  


Talk about diffrent types of cables used in lan cabling?

18 Answers   AdOn, College School Exams Tests, Genpact,


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)