Answer Posted / sheetal suthar
confidiantiality
authenticity
intigrity
availibility
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
How long can a ddos attack last?
What is BSOD?
How does ransomware work?
What is RIS?
If you need to encrypt and compress data for transmission, how would you achieve it?
What is the idea behind the Bell-La Padula model?
Difference between the communication and transmission.
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What are Digrams and Trigrams
What type of network do you use at home?
Describe a TCP connection sequence
What is a ddos attack?
What is an information security management system (isms)?
What is the difference between a virus and malware?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)