P
Q. Which of the following are not security policies?
- Correct Answer - Option(C)
- Views: 821
- Filed under category Information Cyber Security
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related Posts
Q. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
Q. What does OSI stand for in the OSI Security Architecure?
Q. Pretty good privacy (PGP) is used in ______
Q. There are ______ types of firewall.
Q. ATM pin while withdrawing money is an example of using:
Q. Which one of the following algorithm is not used in asymmetric-key cryptography?
Q. In asymmetric key cryptography, the private key is kept by
Q. Which protocol is used to convey SSL related alerts to the peer entity?
View All Posts
Question analytics

Discusssion
Login to discuss.