Respuesta :

Answer:

The correct answer to the following question will be Option D (Network-security protocols).

Explanation:

  • Methods and procedures for protecting network data from unwanted information retrieval are managed by network security protocols.
  • They are a network-style protocol that guarantees the protection and privacy of data in transit through a wireless connection. It describes procedures and techniques for protecting network data from every unauthorized effort to access or remove data material.

Therefore, Option D is the right answer.

Lanuel

The option which ensures the integrity and security of data that are passing over a network is: d) Network-security protocols.

Cybersecurity refers to the preventive practice adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use;

  • A body of technology.
  • Processes.
  • Frameworks.
  • Policies.
  • Network engineers.

In Cybersecurity, certain security standards, policies, frameworks, technology, antivirus utility, and best practices must be adopted to prevent data theft, data corruption by malwares (viruses), enhance data integrity, secure (protect) data and mitigate any unauthorized access or usage of the system network by a hacker.

Similarly, network-security protocols are standard frameworks and protocols under Cybersecurity that are designed and developed to ensure data integrity and the security of data that are being transmitted (sent) and received over a network.

Read more: https://brainly.com/question/24112967

ACCESS MORE