MCQOPTIONS
Home
About Us
Contact Us
Bookmark
Saved Bookmarks
Testing Subject
General Aptitude
Logical and Verbal Reasoning
English Skills Ability
Technical Programming
Current Affairs
General Knowledge
Finance & Accounting
GATE (Mechanical Engineering)
Chemical Engineering
→
Network Security
→
Networking Overview I
→
In terms of Web Security Threats, “Impersonation...
1.
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
A.
True
B.
False
Answer» C.
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
Which of the following are possible sizes of MACs?i) 12 Bytesii) 16 Bytesiii) 20 Bytesiv) 24 Bytes
Consider the following example –Size of Plaintext – 48 bytes.Size of MAC – 20 bytes.Block Length – 8 bytes.How many bytes of padding need to be added to the system?
After the encryption stage in SSL, the maximum length of each fragment is
The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.
Which one of the following is not a higher –layer SSL protocol?
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
THE_FULL_FORM_OF_SSL_IS?$
After the encryption stage in SSL, the maximum length of each fragment is$
Which of the following are possible sizes of MACs?
Which protocol is used for the purpose of copying the pending state into the current state?
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies