What is difference between discretionary access control and mandatory access control?
What are the possible means of Internet attacks?
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
Name firewall architectures?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is broadband?What is bandwidth?What is frequency?
A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
What are the possible ways of data exchange
If you need to encrypt and compress data for transmission, how would you achieve it?
How does the HTTP handle state?
What is a Password?
SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)
What is a security policy?