Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
The DoS attack is which the attacker establishes a large number of half-open or fully open TCP connections at the target host
C. connection flooding
C. connection flooding
See lessWhich of the following is a form of DoS attack ?
D. all of the mentioned
D. all of the mentioned
See lessThe attackers a network of compromised devices known as
B. botnet
B. botnet
See lessCryptographic hash function takes an arbitrary block of data and returns
A. fixed size bit string
A. fixed size bit string
See lessElGamal encryption system is
B. asymmetric key encryption algorithm
B. asymmetric key encryption algorithm
See lessWhich one of the following is a cryptographic protocol used to secure HTTP connection?
B. transport layer security (tsl)
B. transport layer security (tsl)
See lessCryptanalysis is used
A. to find some insecurity in a cryptographic scheme
A. to find some insecurity in a cryptographic scheme
See lessWhat is data encryption standard (DES)?
A. block cipher
A. block cipher
See lessIn cryptography, the order of the letters in a message is rearranged by
A. transpositional ciphers
A. transpositional ciphers
See lessWhich one of the following algorithm is not used in asymmetric key cryptography?
C. electronic code book algorithm
C. electronic code book algorithm
See less