Showing: sws(26)reset
× Close
Join the Ques10 Community
Ques10 is a community of thousands of students, teachers, and academic experts, just like you.
Join them; it only takes a minute
Sign up
<prev • 64 results • page 1 of 3 • next >
0
votes
1
answer
453
views
1
answer
Explain Port Scanning and IP spoofing
sws(26) written 7 months ago by awari.swati831140 • updated 4 months ago by sayleeprabhu260
7
votes
1
answer
1.8k
views
1
answer
Consider an Online Shopping site identify vulnerability ,threat and attack
sws(26) written 7 months ago by awari.swati831140 • updated 4 months ago by nirajsingh24250
0
votes
1
answer
393
views
1
answer
Explain DDOS attack?
sws(26) written 7 months ago by awari.swati831140 • updated 4 months ago by Frustrated engineer0
0
votes
1
answer
906
views
1
answer
6
votes
1
answer
3.9k
views
5 follow
1
answer
0
votes
1
answer
2.7k
views
1
answer
0
votes
0
answers
250
views
0
answers
3
votes
1
answer
2.3k
views
1
answer
Differentiate between SSL and IP Sec protocols
sws(26) written 2.2 years ago by Ramnath3.1k • updated 7 months ago by awari.swati831140
0
votes
0
answers
86
views
0
answers
Write short notes on Secure email
sws(26) written 7 months ago by awari.swati831140
0
votes
0
answers
108
views
0
answers
0
votes
0
answers
165
views
0
answers
0
votes
0
answers
222
views
0
answers
0
votes
0
answers
281
views
0
answers
0
votes
0
answers
337
views
0
answers
0
votes
0
answers
316
views
0
answers
3
votes
1
answer
2.6k
views
1
answer
Explain secure Email Protocols and S/MIME
sws(26) written 2.2 years ago by Ramnath3.1k • updated 7 months ago by awari.swati831140
0
votes
0
answers
174
views
0
answers
0
votes
1
answer
1.8k
views
1
answer
Explain Distributed Denial of Service attack
sws(26) written 2.2 years ago by Ramnath3.1k • updated 7 months ago by awari.swati831140
0
votes
0
answers
307
views
0
answers
Explain Honey Pots
sws(26) written 7 months ago by awari.swati831140
0
votes
0
answers
392
views
0
answers
0
votes
0
answers
313
views
0
answers
0
votes
0
answers
177
views
0
answers
Describe TCP Syn Flood Attack?
sws(26) written 7 months ago by awari.swati831140
0
votes
0
answers
455
views
0
answers
2
votes
1
answer
2.4k
views
1
answer
Explain Linearization attack.
sws(26) written 2.2 years ago by Ramnath3.1k • updated 7 months ago by awari.swati831140
0
votes
1
answer
2.0k
views
1
answer
What$'$s Digital Right management? Explain DRM in Real world.
sws(26) written 2.2 years ago by Ramnath3.1k • updated 7 months ago by awari.swati831140
<prev • 64 results • page 1 of 3 • next >


Use of this site constitutes acceptance of our User Agreement and Privacy Policy.