answersLogoWhite

0


Best Answer

Application

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What layer of the OSI model provides user authentication and establishes agreement on procedures for error recovery and control of data integrity?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What layer of the osi model provides user authentication and establishes agreement on procedures for error recovery and control data integrity?

Application


What are the components of information security?

Availability, Confidentiality, Authentication and Integrity


WTLS ensures integrity through what device?

Message authentication codes


Which IPsec component provides connectionless integrity and data authentication but does not provide confidentiality?

Answer: The Authenticated Header (AH) In the IPSec protocol the only traffic that is unencrypted is the (AH). In other words, it only signs the traffic to retain its authentication & integrity, but no privacy.


Which knowledge domains are associated with the Security plus certification?

Confidentialit, Integrity, Authentication, Availability


What two things does SSL provide and how does this differ if the certificate is self signed?

Authentication Integrity


What type of testing can test an application's access control authentication criteria and integrity corresponds?

Security


What is a reason to implement Kerberos over local system authentication?

Centralized file integrity protection!


All what are ensured by IA except a. Availability b. Authentication c. Integrity d. Authorization?

b


What Type Of Testing with Integrity Corresponds of the process of testing an application's access control and authentication criteria?

Security


Automating business procedures and automatically maintaining data integrity and consistency are trivial in a modern business environment?

Automation of business procedures and automatically maintaining data integrity and consistency are trivial in a modern business environment.


Identification and authentication systems support the minimum requirements of what?

Identification and authentication systems support the minimum requirements of multi-user operating systems. Confidentiality and integrity of such systems is important due to the sensitive nature of the data they contain.