Correct Answer: non-persistent and persistent.
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Internet Security Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Internet Security MCQ Questions
What does a cryptographic key do within the Internet Layer?
What is a method to fend off a Sockstress attack?
Which of the following is a VALID digital signature key?
Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?
Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?
In which protocol does an SYN attack help to find a weakness?
In how many phases is a IPSec VPN connection completed while making a VPN connection with a Security product?
Which is an application attack?
Which is the standard certificate?
Which Asymmetric encryption algorithms is supported by S/MIME?