A session symmetric key between two parties is used
Answer: A
No answer description available for this question
Enter details here
Encryption and decryption provide secrecy, or confidentiality, but not
Answer: B
No answer description available for this question
Enter details here
When data must arrive at receiver exactly as they were sent, its called
Answer: B
No answer description available for this question
Enter details here
Firewalls are used to protect against --------
Answer: C
No answer description available for this question
Enter details here
A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.
Answer: D
No answer description available for this question
Enter details here
The type(s) of auto executing macros, in Microsoft word is/are
Answer: D
No answer description available for this question
Enter details here
The altering of data so that it is not usable unless the changes are undone is
Answer: B
No answer description available for this question
Enter details here
Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
Answer: A
No answer description available for this question
Enter details here
Which of the following is known as Malicious software?
Answer: D
No answer description available for this question
Enter details here
Message confidentiality or privacy means that sender and receiver expect
Answer: B
No answer description available for this question
Enter details here