Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is SSL and why is it not enough when it comes to encryption?



What is SSL and why is it not enough when it comes to encryption?..

Answer / chaitanya

SSL is identity verification, not hard data encryption. It is designed to be able to prove that the person you are talking to on the other end is who they say they are. SSL and its big brother TLS are both used almost everyone online, but the problem is because of this it is a huge target and is mainly attacked via its implementation (The Heartbleed bug for example) and its known methodology. As a result, SSL can be stripped in certain circumstances, so additional protections for data-in-transit and data-at-rest are very good ideas.

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More Computer Security Interview Questions

 What is the difference between a Black Hat and a White Hat?

1 Answers  


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

0 Answers  


What is a driver in computer?

0 Answers  


What is a table in computer?

0 Answers  


 How would you compromise an “Office Workstation” at a hotel?

1 Answers  


If you were going to break into a database-based website, how would you do it?

1 Answers  


What are the three ways to authenticate a person?

1 Answers  


What is dora process in DHCP and how it works?

0 Answers  


What are accessories in computer?

0 Answers  


Is a console a computer?

0 Answers  


Why are internal threats oftentimes more successful than external threats?

1 Answers  


 You see a user logging in as root to perform basic functions. Is this a problem?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)