Answer Posted / karthiga ashokkumar
Confidentiality
Integrity
Availability
Authenticity
Authorization
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
Is vpn traffic encrypted?
Why do we use virtual private network?
What is an arp and how does it work?
What are all the technical steps involved when the data transmission from server via router?
What is proxy firewall?
What a security mean in your sense?
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
What are the different type of networking / internetworking devices
What is trojan virus?
What is cloud security?
What is frame relay, in which layer it comes
What are the benefits of the firewall?
Name the port used by PING.
What is Imaging/ghosting?
What is a DNS resource record