CHAP stands for
Carrier Handshake Availability Protocol
ChallengeHandover Authentication Protocol
canonical Handshake Availability Protocol
Challnge Handshake Authentication Protocol
The Science associated with Breaking A CIPHER is called as
Cryptanalysis
crptology
cryptogram
steganography
SYN FLOODING attack exploits a vulnerability in
hole in IIS
vulnerability in NETSCAPE
TCP/IP three way Handshake
SCTP fourway Handshake
CIA of security stand for
Confidentiality,Integrity and Availability
Confidentiality,Integrity and accessibility
confidentiality Informativity Authentication
Confidentiality Integrity Access Control
What is the best way they can do this?
SYMMETRIC CRYPTOSYSTEM
ASYMETTRIC CRYPTOSYSTEM
HYBRID CRYPTOSYSTEM
NONE
Passwords are usually stored in the systems
Hashed form
Encrypted Form
Plain text form
none
The Science associated with hiding text within text is known as (information can be hidden digitally also)
Steganography
Cryptography
Cryptology
Buffer overflows are most dangerous when they occur in programs
Run by the administrator
Run by normal user
Run by the attacker
Run by the remote user
DES IS STILL SECURE
True
False
Digital Signature does not provide protection from tampering.