Which technology can a network administrator use to detect and drop the altered data traffic?

A private wan connection is suspected of intermittently corrupting data. Which technology can a

network administrator use to detect and drop the altered data traffic?

A private wan connection is suspected of intermittently corrupting data. Which technology can a

network administrator use to detect and drop the altered data traffic?

A.
AES-128

B.
RSA Certificates

C.
SHA2-HMAC

D.
3DES

E.
Diffie-Helman Key Generation

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *