Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
As an application of cryptography, digital Signatures and MACs can be used for_____________.
Home
Ethical Hacking
As an application of cryptography, digital Signatures and MACs can be used for_____________.
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
Q:
As an application of cryptography, digital Signatures and MACs can be used for_____________.
(1)Authentication
(2)Confidentiality
(3)Integrity
(4)Availability
#mac
1
Answer
0
votes
answered
Jun 8, 2020
by
DavidAnderson
Authentication
Related questions
+2
votes
Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
0
votes
Q: how to screenshot on mac
asked
May 13, 2019
in
Other
by
Robindeniel
#screenshot
#mac
#macscreenshot
#sacreenshotmac
0
votes
Q: Which cryptographic extension provide generation and verification of digital signatures?
asked
Jun 22, 2019
in
PHP
by
SakshiSharma
#php
#php-php
#php-server-monitor-script
#php-support
#mysql-php
#php-programmer
#php-development
#php-language
0
votes
Q: SOAP Digital Signatures exploits _____________________ to digitally sign SOAP messages.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
soap-digital-signature
+1
vote
Q: The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following services can be used as an application firewall in AWS?
asked
Aug 30, 2022
in
AWS
by
sharadyadav1986
aws
firewall
security
services
cloud
+2
votes
Q: Can you write a Java class that could be used both as an applet as well as an application?
asked
May 12, 2021
in
JAVA
by
rajeshsharma
java-class
java-application
java
Java-questions-answers
+3
votes
Q: Which of the following can be considered as an effective solution to ensure integrity?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
#abstraction
+3
votes
Q: _____ is a mechanism that allows digital assets from one blockchain to be used as a separate blockchain.
asked
Aug 14, 2019
in
BlockChain
by
rahulsharma
#blockchain
#cap-theorem
#blockchain-structure
#public-blockchains
#private-blockchains
#consortium-blockchains
#sidechains
#smart-contracts
#blockchain-types
0
votes
Q: The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
Q: A Flow Library contains a set of ______ used for common tasks like notarizing a transaction, gathering required signatures, etc.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
Q: A Flow Library contains a set of ______ used for common tasks like notarizing a transaction, gathering required signatures, etc.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
Q: Which Flask extension can be used to create an Ajax application?
asked
Dec 23, 2022
in
Python Flask
by
john ganales
flask-application
0
votes
Q: Consider you have an application that does not work correctly in Windows 10 but works fine in Windows XP. Which of the following can be used in your Windows 10 machine to work the application?
asked
Oct 25, 2022
in
Service Deployment Concepts
by
DavidAnderson
service-deployment-questions-answers
0
votes
Q: ________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
cyclometric-complexity
+1
vote
Q: The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+3
votes
Q: What are the main tokens used as digital currency in Ethereum?
asked
Aug 14, 2019
in
BlockChain
by
rahulsharma
#blockchain
#cap-theorem
#blockchain-structure
#public-blockchains
#private-blockchains
#consortium-blockchains
#sidechains
#smart-contracts
#blockchain-types
0
votes
Q: _________ can be defined as a data model which can be accessed at the database level and not at the application level.
asked
Mar 31, 2022
in
SAP S/4HANA Reporting and Analytics
by
Robindeniel
sap-database
sap-s
4hana-reporting-and-analytics
basic-configurations-sap
embedded-analytics-s4hana
sap-analytics
sap-analytical-reporting
multidimensional-reporting
analytics-architecture-sap
sap-reporting
0
votes
Q: Bank of Baroda is set to develop an agriculture digital platform. It was named as;
asked
Oct 19, 2019
in
Other
by
JackTerrance
#gk
#generalknowledge
#currentaffair
0
votes
Q: Can an empty VSAM file be used as input to a Cobol program?
asked
Aug 27, 2022
in
VSAM
by
Robin
vsam
file
cobol-program
...