Answer Posted / karthiga ashokkumar
Confidentiality
Integrity
Availability
Authenticity
Authorization
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is a Password?
What is BSOD?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What is trojan virus?
What are manageable and non manageable switches?
Why should you care about the OSI Reference Model
How to you keep yourself updated on network security ?
What is network security?
What is stateful inspection firewall?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is the difference between routable and non- routable protocols
What does cia stand for in security management?
How does network security work?
What are the data units at different layers of the TCP / IP protocol suite
What is shadow it?