V
Q. means when an attacker pretends to be authentic user
- Correct Answer - Option(A)
- Views: 944
- Filed under category Information Cyber Security
V
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Q. Modification of Data is done in:
Q. _________ type of VPNs are used for home private and secure connectivity.
Q. IPSec provides ....protocols for network layer
Q. Conventional cryptography is also known as or symmetric-key encryption.
Q. The type of report that is a preliminary summary of findings is known as:
Q. One advantage of Packet Filtering firewall is __________
Q. _______ uses the idea of certificate trust levels.
Q. In the ______________ layer of OSI model, packet filtering firewalls are implemented.
Q. Data integrity gets compromised when and are taken control off.
Discusssion
Login to discuss.