Answer Posted / sheetal suthar
confidiantiality
authenticity
intigrity
availibility
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
Explain what are digital signatures and smart cards?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What is network access control?
How long can a ddos attack last?
What is the difference between a switch and a hub?
What is the idea behind the Bell-La Padula model?
If you need to encrypt and compress data for transmission, how would you achieve it?
What are the different type of networking / internetworking devices
What a security mean in your sense?
What is an information security management system (isms)?
Describe a TCP connection sequence
What is shadow it?
What is classful and classless routing?
What is http flood?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?