Answer Posted / karthiga ashokkumar
Confidentiality
Integrity
Availability
Authenticity
Authorization
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the main components of the CERT Taxonomy?
What is proxy firewall?
What is Imaging/ghosting?
Which are the different factors that affect the security of a network?
How does the HTTP handle state?
What are the different aspects of shadow it?
What is a DNS resource record
How does phishing work?
Where do you get updates on security?
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?
What is the difference between arp & rarp?
What is intrusion prevention systems (ips)?
Is vpn traffic encrypted?
What is RIS?
What are manageable and non manageable switches?