Which layer filters the proxy firewall?
A) application
B) network
C) transport
D) none of the above
Correct Answer:
Verified
Q6: Which one is the strong attack mechanism?
A)chosen
Q7: Interception is an attack on
A)availability
B)confidentiality
C)integrity
D)authenticity
Q8: Chosen cipher text attack is based on
A)cryptanalysis
B)cryptography
C)encryption
D)decryption
Q9: The process of writing the text as
Q10: Biometric authentication works on the basis of
A)human
Q12: Encryption Strength is based on
A)strength of algorithm
B)secrecy
Q13: GCD(a,b) = GCD(b,a mod b)
A)true
B)false
C)cannot be determined
D)none
Q14: All groups satisfy properties
A)g-i to g-v
B)g-i to
Q15: An Abelian Group satisfies the properties
A)g-i to
Q16: A Ring satisfies the properties
A)r-i to r-v
B)g-i
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents