Which technology can a network administrator use to detect and drop the altered data traffic?

A private wan connection is suspected of intermittently corrupting data. Which technology
can a network administrator use to detect and drop the altered data traffic?

A private wan connection is suspected of intermittently corrupting data. Which technology
can a network administrator use to detect and drop the altered data traffic?

A.
AES-128

B.
RSA Certificates

C.
SHA2-HMAC

D.
3DES

E.
Diffie-Helman Key Generation



Leave a Reply 0

Your email address will not be published. Required fields are marked *