Message authentication is a service beyond
Answer: B
No answer description available for this question
Enter details here
What is “Trend Micro”?
Answer: B
No answer description available for this question
Enter details here
Social engineering is:
Answer: B
No answer description available for this question
Enter details here
Confidentiality with asymmetric-key cryptosystem has its own
Answer: C
No answer description available for this question
Enter details here
All of the following are examples of real security and privacy risks EXCEPT
Answer: A
No answer description available for this question
Enter details here
SHA-l has a message digest of
Answer: A
No answer description available for this question
Enter details here
Which among the following is independent malicious program that need not any host program?
Answer: D
No answer description available for this question
Enter details here
The virus that spread in application software is called as
Answer: B
No answer description available for this question
Enter details here
A strong password should contain:
Answer: C
No answer description available for this question
Enter details here
A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
Answer: D
No answer description available for this question
Enter details here