Top

Computer Security

Answer: C

No answer description available for this question

Enter details here

82.

What type of attack uses a fraudulent server with a relay address?

Answer: B

No answer description available for this question

Enter details here

83.

The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is th

Answer: D

No answer description available for this question

Enter details here

84.

A hash function guarantees integrity of a message. It guarantees that message has not be

Answer: C

No answer description available for this question
 

Enter details here

85.

In Message Integrity, SHA-l hash algorithms create an N-bit message digest out of a message of

Answer: A

No answer description available for this question

Enter details here

86.

To preserve integrity of a document, both document and fingerprint are

Answer: C

No answer description available for this question
 

Enter details here

Answer: D

No answer description available for this question

Enter details here

Loading…
Tags: Computer Security Questions and Answers || Computer Security MCQ Questions and Answers || Computer Security GK Questions and Answers || Computer Security GK MCQ Questions || Computer Security Multiple Choice Questions and Answers || Computer Security GK || GK on Computer Security || Computer Awareness Questions and Answers || Computer Awareness MCQ Questions and Answers || Computer Awareness GK Questions and Answers || GK on Computer Awareness