CSE MCQs :: Computer Security
- What type of symmetric key algorithm using a streaming cipher to encrypt information?
- What type of attack uses a fraudulent server with a relay address?
- Which of the following is independent malicious program that need not any host program?
- In tunnel mode IPsec protects the
- A Extensible authentication protocol is authentication framework frequently used in
- Which of the following is known as Malicious software?
- Which of the following is NOT an example of a smartcard?
- Code red is a(n) ----------