Answer Posted / pawan chalotra
Data Security Standard
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
Can you give me some ransomware variants?
Explain the difference between discretionary access control and mandatory access control?
What are the types fo ddos attacks?
What protocol is used by DNS name servers
How does arp works?
Explain what does cia stand for in security management?
What is multicasting?
What is Imaging/ghosting?
What are the benefits of the firewall?
What is cloud security?
What is ospf protocol
How does a virtual private network (vpn) work?
What is the difference between arp & rarp?
What is data loss prevention (dlp)?