4) Differentiate between symmetric and asymmetric encryption.
5) What are firewalls? What types of firewalls are commonly used?
6) How is a Trojan horse different from a worm?
7) What is the difference between adware and spyware?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here