Tag: architecture
Questions Related to architecture
-
Digital signatues
-
One-way hash algorithms
-
Symmetric encryption
-
Assymetric encryption
-
Plaintext password
-
One-way hash value
-
Digital signature
-
Asymmetric encryption key
-
The excess data is bounced back to the senders Network, causing it to crash
-
The excess data is abosrbed into the reciepient network, causing it to slowdown
-
The excess data overflows into the adjacent buffers, corrupting or overwriting the valid data held in them
-
The excess data is removed by the compiler usually
-
Flooding
-
Saturating
-
Inundation
-
Data-surge
-
Back-door
-
Birthday
-
Man-in-the-middle
-
Spoofing
-
Back-door
-
Birthday
-
Man-in-the-middle
-
Spoofing
-
Inbox rules
-
End user education
-
Firewall
-
The corporate intranet
-
The dictionary attack
-
The hybrid attack
-
The brute-force attack
-
The has attack
-
Parity
-
Striping
-
Mirroring
-
Clustering