Answer Posted / arul.nandhakumar
Confidentiality
Integrity
Availability
Authenticating
Authorization
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What are the types fo ddos attacks?
How do we do authentication with message digest(md5)?
What is subnet
What is utm firewall?
Diff bet ripv1 & ripv2?
What are Digrams and Trigrams
How does arp works?
What type of network do you use at home?
What is ospf protocol
What is shadow it?
What is cloud security?
What is Cross Site Request Forgery and how to defend against it?
What are the different aspects of shadow it?
who is a hacker?
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?