(A) Physical security threats
(B) Data security threats
(C) Accidental threats
(D) Malicious threats
Author:
When the user damages data or equipment unintentionally it is called?
(A) Physical security threats
(B) Data security threats
(C) Malicious threats
(D) Accidental threats
When an employee intends to cause damage it is called?
(A) Data security attacks
(B) Accidental threats
(C) Malicious threats
(D) Physical security attacks
Which among following keep data and information safe by giving only the appropriate people access?
(A) Security threats
(B) Anti-Virus
(C) Firewall
(D) Network security
JCA architecture is?
(A) Plug-able
(B) Not flexible
(C) Implementation dependent
(D) Static
Java cryptography mechanisms are in the form of __ and __.
(A) JCA,JCB
(B) JCA,JCE
(C) JCE,JCF
(D) JCP,JCA
In asymmetric key cryptography __ keys are required per communicating party.
(A) 2
(B) 3
(C) 4
(D) 5
Strongest message digest algorithm is considered as?
(A) SHA-128
(B) SHA-256
(C) SHA-512
(D) SHA-1