in Education by
Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________ (a) address, name (b) address, location (c) network, name (d) network, location The question was posed to me in a national level competition. This interesting question is from Network Models topic in division Understanding Network Models for Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (a) address, name For explanation: Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP)’s address & name. This avoids a remote host to masquerade as an added remote host.

Related questions

0 votes
    The logical port is associated with the type of protocol used along with the IP address of the host. (a) True ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    For secure connection, Remote access VPNs rely on ___________ and ____________ (a) IPSec, SSL (b) L2TP, SSL (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    _____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    ____________ allow its users to attach to the internet via a remote or virtual server which preserves privacy. ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    In which year computer scientists try to integrate encryption techniques in TCP/IP protocol? (a) 1978 (b) 1980 (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the protocol is not used in the network layer of the TCP/IP model? (a) ICMP (b) IP (c) IGMP ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
...