Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

A.
Honeypot

B.
IP Security (IPsec)

C.
DNSSEC

D.
Protocol spoofing



Leave a Reply 0

Your email address will not be published. Required fields are marked *