An attempt to make a computer resource unavailable to its intended users is called ______
A) denial-of-service attack
B) virus attack
C) worms attack
D) botnet process
Correct Answer:
Verified
Q7: ECC stands for
A)elliptic curve cryptography
B)elliptic cryptography curve
C)error
Q8: Diffie-Hellman algorithm is widely known as_
A)key exchange
Q9: Hash function is used for_
A)message authentication
B)digital signature
C)both
Q10: RSA algorithm is best example of_
A)asymmetric key
Q11: In tunnel mode, IPSec protects the _
A)entire
Q13: SSL primarily focuses on _
A)integrity and authenticity
B)integrity
Q14: Pretty good privacy (PGP) is used in
Q15: _ is used for encrypting data at
Q16: WPA2 is used for security in _
A)ethernet
B)wi-fi
C)bluetooth
D)e-mail
Q17: Which of the following is not a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents