Name the port used by PING.
No Answer is Posted For this Question
Be the First to Post Answer
What is phishing?
A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
How does a virtual private network (vpn) work?
What is network access control?
What are the vulnerabilities according to the extended CERT Taxonomy?
What is difference between discretionary access control and mandatory access control?
How long can a ddos attack last?
What protocol is used by DNS name servers
What is information security?
I want to reset the passwords of 100 users.how do you do it?
What is the difference between a switch and a hub?
What is the general data protection regulation (gdpr)?