In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
967Post New Networking Security Questions
How to you keep yourself updated on network security ?
How does the HTTP handle state?
What is shadow it?
What is Cross Site Request Forgery and how to defend against it?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What are the different types of network security?
What is the idea behind the Bell-La Padula model?
What are the different aspects of shadow it?
What is an arp?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
What is the difference between arp & rarp?
Explain the difference between discretionary access control and mandatory access control?
What is slowloris?
What is the difference between a virus and malware?
What is RIS?