What is RIS?
Explain the difference between broadcast domain and collision domain?
Explain how do we use rsa for both authentication and secrecy?
What is the difference between a virus and malware?
What defensive mechanisms for viruses can be encountered?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
Define the meaning of an Authentication.
Explain what does cia stand for in security management?
What are manageable and non manageable switches?
Why do we use virtual private network?
How the Router will pass messages or packets?How it communicate with the Switches?
How does ransomware work?