In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
551Post New Networking Security Questions
Why do we use virtual private network?
What are the types fo ddos attacks?
What is terminal emulation, in which layer it comes
How does arp works?
What does cia stand for in security management?
Explain the difference between discretionary access control and mandatory access control?
What are the main components of the CERT Taxonomy?
What do you do when you get blue screen in a computer? How do you troubleshoot it?
What is classful and classless routing?
Diff bet ripv1 & ripv2?
How does ransomware work?
What is the sense of a fingerprint?
Explain what does cia stand for in security management?
What are the benefits of the firewall?
Explain what are digital signatures and smart cards?