Professional Documents
Culture Documents
Application Cyber Security
Application Cyber Security
Q. No. 1. Answer all the questions, each within one word or one sentence. Marks: 1 × 10 = 10
false
Worm
drp
messages or documents.
digital signature
h) __________ encryption is a cryptographic system that uses a system of two keys.
Asymmetric cryptography
i) The _________ family of standards offers a set of specifications, codes of conduct and best
ISO9000
d) What is pen testing? Briefly explain about various types of pen testing.