How do cryptography-based keys ensure the validity of data
transferred across the network?

Answer Posted / deniaxis

Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.

Is This Answer Correct ?    7 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is your most recent experience with VERTAS backup software?

1578


Hi i need one website name.Which is used to identify or find the system or person who or which are logged in to the Internet or working with Internet.We can watch and access their drives(memory) also through that website.Could you please tell me which is that website.Please answer me.Advance thanks

1553


how to take backup of BIOS ?

2771


What is the minimum and maximum length of the header in the TCP segment and IP datagram

710


Explain Attenuation?

697






Explain different kinds of Switching techniques.

1168


What is multicast routing

704


In which of the 7 layers of OSI will a service handling conversion of characters is from EBCDIC to ASCII be normally implemented ?

1148


up to which ver of linux using lilo boot loader? last ver of linux.

1523


Explain Traffic shaping using token bucket algorithm

1094


Write a short note on ISDN?

1531


What is the average number of transmission required to send a frame of length 1600 bytes correctly, if the bit error rate is 1 x 10-6.

1145


how do u share printer through FTP(fire transfer protocol)?

1678


Which device is needed to connect two LANs with different network Ids ?

1203


what are the two sub layers of data link layer called ?

1560