R
Q. _______ uses the idea of certificate trust levels.
Correct Answer - Option(B)
Be the first to start discuss.
Related Posts
Q. ACL stands for _____________
Q. When a packet does not fulfil the ACL criteria, the packet is _________
Q. The __________ defines the packet filtering firewall rules.
Q. An attempt to make a computer resource unavailable to its intended users is called ______
Q. In asymmetric key cryptography, the two keys e and d, have special relationship to
Q. In the ______________ layer of OSI model, packet filtering firewalls are implemented.
Q. In asymmetric key cryptography, the private key is kept by __________
Q. Conversion of plain text into Cipher text is called as________.
Discusssion
Login to discuss.