Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?
A.
Honeypot
B.
IP Security (IPsec)
C.
DNSSEC
D.
Protocol spoofing
Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?
Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?
A.
Honeypot
B.
IP Security (IPsec)
C.
DNSSEC
D.
Protocol spoofing