Answer Posted / pawan chalotra
Data Security Standard
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is the difference between routable and non- routable protocols
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?
What is ransomware?
What is cloud security?
What is udp flood?
What is classful and classless routing?
What are the different aspects of shadow it?
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
Describe a TCP connection sequence
What are the data units at different layers of the TCP / IP protocol suite
What are the different type of networking / internetworking devices
Why is it important to have a nac solution?
What are worms?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?