Professional Documents
Culture Documents
Cyber Forensic
Cyber Forensic
(A) SSL
(B) HTTPL
(C) SMTP
(D) SFTP
(A) 7
(B) 3
(C) 1
(D) 4
16. For RSA to work, the value of P must be less than the value of
(A) p
(B) q
(C) n
(D) r
17. An attempt to make a computer resource unavailable to its intended
users is called _________
(A) Ethernet
(B) Wi-Fi
(C) Bluetooth
(D) E-mail
(A) RSA
(B) AES
(C) DES
(D) ROBIN