0
2.2kviews
IT Cryptography & Network Security Module 5.1
1 Answer
0
3views

Subject: Cryptography & Network Security

Topic: Module 5

Difficulty: Medium/High

$\underline{\textbf{TCP Vulnerabilities (layerwise)}}$

[m5-1]

1. Application Layer

Protocols used: HTTP, FTP, telnet, SMTP, DHCP

a) HTTP: we communicate to the internet via a web browser, the web browser by default use HTTP as a communication protocol to transfer files that …

Create a free account to keep reading this post.

and 5 others joined a min ago.

Please log in to add an answer.