Computer Application Set-2
Question 1 The initial phase of ethical hacking is____________. A. DNSB. Foot printingC. ARPD. Enumeration Question 2 What is cyber […]
Question 1 The initial phase of ethical hacking is____________. A. DNSB. Foot printingC. ARPD. Enumeration Question 2 What is cyber […]
Question 1 Palm scan, Fingerprint and Iris scan are forms of A. Strong authenticationB. Two factor authenticationC. Biometric authenticationD. None