Tag css css 21 Questions Ask question Search Order By: ActiveClear Filter 0 Votes 1 Ans Briefly explain database security. 1.37K viewsAnonymous Posted new comment June 1, 2024ai-ds css 0 Votes 2 Ans d. List and explain security requirements of database. 847 viewsTeam Changed status to publish May 16, 2024css 0 Votes 1 Ans CSS – Cryptography & System Security IMP Questions for IA 2 392 viewsTeam Answered question May 16, 2024Cryptography & System Security css 0 Votes 1 Ans Explain digital  signature scheme RSA. 800 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B want to use RSA to communicate securely 1.50K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans User A and B decide to use Diffie-Hellman algorithm to share a key. 785 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain memory and address protection in detail. 1.20K viewsSupriya Birajdar Answered question May 16, 2024ai-ds css 1 Votes 1 Ans write short note on X.509 in CSS Solved748 viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Give the format of X.509 digital certificate and explain the use of a digital signature in it 587 viewsTeam Changed status to publish May 16, 2024ai-ds css 1 Votes 1 Ans short note on DNS attack 795 viewsTeam Posted new comment May 16, 2024ai-ds css 0 Votes 2 Ans Encrypt “The key is hidden under the door” using playfair cipher with keyword “domestic”. Solved526 viewsTeam Selected answer as best May 16, 2024ai-ds css 0 Votes 1 Ans Describe services and mechanisms in CSS 1.51K viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain characteristics needed in secure hash function. 722 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Enlist various functions of protocols of SSL. 873 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans List and explain vulnerabilities in windows operating system 576 viewsTeam Answered question May 16, 2024ai-ds css 0 Votes 1 Ans Explain Diffie hellman key exchange algorithm. 954 viewsAnonymous Posted new comment May 13, 2024ai-ds css 0 Votes 1 Ans Explain with examples, keyed and keyless transposition ciphers. 192 viewsTeam Answered question May 12, 2024ai-ds css 1 Votes 2 Ans Use the playfair cipher Solved1.21K viewsAnonymous Posted new comment May 11, 2024ai-ds css 0 Votes 2 Ans Explain clickjacking and session hijacking. Solved994 viewsAnonymous Posted new comment May 11, 2024ai-ds css 0 Votes 1 Ans bhai crosssite foregery request samjhao na koi 282 viewsTeam Answered question April 10, 2024Cryptography & System Security css 1 2 Next »