Which of the following protocols uses UDP:
Correct Answer: TFTP
Explanation:
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Internet Security Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Internet Security MCQ Questions
Which goal cannot be achieved with Symmetric cryptography?
The ability to exploit a vulnerability is called:
Allen wants to sign a message which he is sending to Mark. Which key will Allen use to sign the message?
Which protocol helps in securing LDAP?
By which third party is Digital Certificates signed?
Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
Which of the following is a VALID ephemeral key?
Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
What is the less secure AES encryption mode?
Which of the following represents a cryptographic key that is intended to be used for a long period of time?