Answer Posted / pranita sanjay yadav
Viruses, worms, ransomwares, happy birthday virus, rat ,keylogger,rootkit
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
How do we use rsa for both authentication and secrecy?
What is utm firewall?
Explain abouT Security Life Cycle.
If you need to encrypt and compress data for transmission, how would you achieve it?
What are the main components of the CERT Taxonomy?
How do we do authentication with message digest(md5)?
Name the port used by PING.
Describe a TCP connection sequence
What are Digrams and Trigrams
What is trojan virus?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
Explain what are digital signatures and smart cards?
What is difference between discretionary access control and mandatory access control?
What is the idea behind the Bell-La Padula model?
What is the difference between a switch and a hub?