Multiple Choice
The full form of OSI is OSI model is ____________________________
A) open systems interconnection
B) open software interconnection
C) open systems internet
D) open software internet
Correct Answer:

Verified
Correct Answer:
Verified
Q3: In layer, vulnerabilities are directly associated with
Q4: _ attack is when original data is modified
Q5: The information that gets transformed in encryption
Q6: From the options below, which of them
Q7: Release of Message Content and Traffic analysis
Q9: _Policy ensures that the organization is maintaining
Q10: Compromising confidential information comes under _ <br>A)bug<br>B)threat<br>C)vulnerability<br>D)attack
Q11: When original data is changed to make
Q12: Which of the following are not security
Q13: Modification of Data is done in:<br>A)both active