أهلا وسهلا بكم في مدونة
منوعات فلسطينية

الثلاثاء، 17 مايو 2022

Information Security answer

 When the data is known by the very high authority persons only. Lose of this data may cause critical damage to the company  secret Diffie...

Information Security

 a- Choose the correct answer and put it in the table below 1. In computer security, ……………………. means that computer system assets can be modified...

Information Security E2

 a- Choose the correct answer and put it in the table below  1. …………….. are used in denial of service attacks, typically against targeted web...

Security T OR F

 1. The process of converting from plaintext to ciphertext is known as deciphering or decryption. (T)2. When using symmetric encryption it is very...

Unit 1 & 2 Information Security

Unit 1 & 2   1.One commonly used public-key cryptography method is the ______ algorithm. A) RSS B) RAS C) RSA D) RAA     2....