Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    95. Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Ricardo using?

    A. Encryption

    B. Steganography

    C. RSA algorithm

    D. Public-key cryptography

    96. The purpose of a ____ is to deny network access to local area networks and other information assets by unauthorized wireless devices.

    A. Wireless Access Control List

    B. Wireless Analyzer

    C. Wireless Intrusion Prevention System

    D. Wireless Access Point

    < Prev.Page             CEHv9 Home             Next page>