Question 36
Which of the following is a passive attack?
Question 37
Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?
Question 38
Which of the following is a symmetric 64-bit block cipher that can support key lengths up to 448 bits?
Question 39
Which of the following is a class of attacks to break through, which depends on a greater probability of collisions between random attack was detected, and try to fixed rate permutations?
Question 40
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?