99, When an attempt is to make a machine or network resource unavailable to its intended
users, the attack is called :
(A) Slow read attack (8) Spoofed attack
(C) Starvation attack (D) Denial of service attack
100. In asymmetric encryption :
(ಹಿ) Same key is used for encryption and decryption
(8) Different keys are used for encryption and decryption
(ಲ) No key is required for encryption and decryption
(2) No key is used for encryption and a public ....
See more