A. AH
B. ESP
C. SPE
D. None of the choices are correct.
View Answer
ANSWER: A) AH
Explanation : No Explantion Given
Explanation : No Explantion Given
A. AH
B. ESP
C. SPE
D. None of the choices are correct.
View Answer
ANSWER: A) AH
Explanation : No Explantion Given
Explanation : No Explantion Given
A. AH
B. ESP
C. SPE
D. None of the choices are correct.
View Answer
ANSWER: B) ESP
Explanation : No Explantion Given
Explanation : No Explantion Given
A. AH
B. ESP
C. TLS
D. None of the choices are correct.
View Answer
ANSWER: C) TLS
Explanation : No Explantion Given
Explanation : No Explantion Given
A. AH
B. ESP
C. TLS
D. None of the choices are correct.
View Answer
ANSWER: D) None of the choices are correct.
Explanation : No Explantion Given
Explanation : No Explantion Given
A. network; application
B. transport; application
C. network; transport
D. None of the choices are correct
View Answer
ANSWER: C) network; transport
Explanation : No Explantion Given
Explanation : No Explantion Given
A. transport
B. network
C. application
D. None of the choices are correct.
View Answer
ANSWER: C) application
Explanation : No Explantion Given
Explanation : No Explantion Given
A. Confidentiality, cryptography, and nonrepudiation
B. Confidentiality, encryption, and decryption
C. Confidentiality, integrity, and availability
D. None of the choices are correct.
View Answer
ANSWER: C) Confidentiality, integrity, and availability
Explanation : No Explantion Given
Explanation : No Explantion Given
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. None of the choices are correct.
View Answer
ANSWER: A) Masquerading
Explanation : No Explantion Given
Explanation : No Explantion Given
A. Replaying
B. Modification
C. Denial of service
D. None of the choices are correct.
View Answer
ANSWER: B) Modification
Explanation : No Explantion Given
Explanation : No Explantion Given