a) An intrusion detection system
b) A cryptographic protocol providing communications security over the internet
c) A firewall
d) A cryptographic software which provides for key based asymmetric cryptography for encryption and authentification.
b) A cryptographic protocol providing communications security over the internet
c) A firewall
d) A cryptographic software which provides for key based asymmetric cryptography for encryption and authentification.
KPSC SI Exam-15
0 Comments