Answer Posted / sheetal suthar
confidiantiality
authenticity
intigrity
availibility
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
What does cia stand for in security management?
What is network security?
Explain what is the role of single sign on in authentication technologies?
Which are the different factors that affect the security of a network?
Explain for a small lan which class of addressing is used?
What is kerberos protocol?
What are digital signatures and smart cards?
What is terminal emulation, in which layer it comes
What is BSOD?
Explain how do we use rsa for both authentication and secrecy?
Difference between bit rate and baud rate.
How does dlp work?
What is the sense of a fingerprint?
What are the main components of the CERT Taxonomy?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)