What type of attack uses a fraudulent server with a relay address?
A) ntlm
B) mitm
C) netbios
D) smb
Correct Answer:
Verified
Q4: This helps in identifying the origin of
Q5: Data _ is used to ensure confidentiality.
A)encryption
B)locking
C)decryption
D)backup
Q6: What does OSI stand for in the
Q7: A company requires its users to change
Q8: The _ is encrypted text.
A)cipher scricpt
B)cipher text
C)secret
Q10: Which is the largest disadvantage of the
Q11: In cryptography, what is cipher?
A)algorithm for performing
Q12: In asymmetric key cryptography, the private key
Q13: Which one of the following algorithm is
Q14: In cryptography, the order of the letters
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents