Time Left - 10:00 mins
Cyber Security & emerging technology
Attempt now to get your rank among 78 students!
Question 1
Which of the following risk may arise, when same key is used to encrypt directions of a communication channel, that are not present if using different keys in both direction?
Question 2
Which one of the following algorithm is not used in asymmetric-key cryptography?
Question 3
___________ is a weakness that can be exploited by attackers.
Question 4
Which of them is not a wireless attack?
Question 5
CIA triad is also known as ________
- 78 attempts
- 0 upvotes
- 0 comments
Jul 5GATE & PSU CS