An attempt to make a computer resource unavailable to its intended users is called
A) denial-of-service attack
B) virus attack
C) worms attack
D) botnet process
Correct Answer:
Verified
Q14: is used for hiding the payment information
Q15: The cryptography algorithms used in S/MIME are
Q16: In S/MIME,MLA stands for .
A)mailing list agent.
B)multipurpose
Q17: Which component is included in IP security?
A)authentication
Q18: WPA2 is used for security in
A)ethernet
B)bluetooth
C)wi-fi
D)email
Q20: PGP is used in
A)browser security
B)email security
C)ftp security
D)wifi
Q21: In tunnel mode, IPSec protects the
A)entire ip
Q22: IPSec is designed to provide security at
Q23: Which of the following is not a
Q24: SSL primarily focuses on
A)integrity and authenticity
B)integrity and
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents