IPsec is designed to provide the security at the
Answer: b
Explanation: Network layer is used for transferring the data from transport layer to another layers.
In tunnel mode IPsec protects the
Answer: a
Explanation: It is nothing but adding control bits to the packets.
A ___________ is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
Answer: b
Explanation: VIRTUAL PACKET NETWORK.
Which component is included in IP security?
Answer: d
Explanation: AH, ESP, IKE.
WPA2 is used for security in
Answer: c
Explanation: WPA2 is best with Wi-Fi connection.
An attempt to make a computer resource unavailable to its intended users is called
Answer: a
Explanation: Denial of service attack.
Extensible authentication protocol is authentication framework frequently used in
Answer:b
Explanation:Most data transfer is with wireless networks.
Pretty good privacy (PGP) is used in
Answer: b
Explanation: PGP is at email security.
PGP encrypts data by using a block cipher called
Answer: a
Explanation: PGP encrypts data by using a block cipher called international data encryption algorithm.
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called
Answer: c
Explanation: DNS spoofing is the phenomenon for the above mentioned transaction.
Use Code STAYHOME200 and get INR 200 additional OFF
|
Use Coupon Code |
![]() |
|
![]() |
|
![]() |
|
![]() |
|
|
|
|
|