Computer Application

Computer Application Set-2

Question 1 The initial phase of ethical hacking is____________. A. DNSB. Foot printingC. ARPD. Enumeration Question 2 What is cyber […]

Computer Application Set-1

Question 1 Palm scan, Fingerprint and Iris scan are forms of A. Strong authenticationB. Two factor authenticationC. Biometric authenticationD. None

Scroll to Top