perform better
more reliable
more secure
more error-free
Change in permission
Login Failures
Change in privilege
Performance degradation
requires an extranet
requires value added network
can be done on internet
requires a corporate intranet
MIME to attach EDI forms to e-mail messages
FTP to send business forms
HTTP to send business forms
SGML to send business forms
MIME is used
S/MIME is used
PGP is used
TCP/IP is used
is not easily available
defines several hundred transaction sets for various business forms
is not popular
defines only a transmission protocol
wall built to prevent fires from damaging a corporate intranet
security device deployed at the boundary of a company to prevent unauthorized physical access
security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
device to prevent all accesses from the internet to the corporate intranet
routers which connect intranet to internet
bridges used in an intranet
expensive modem
users application programs
filters only packets coming from internet
filters only packets going to internet
filters packets travelling from and to the intranet from the internet
ensures rapid traffic of packets for speedy e-Commerce
Compressing it
expanding it
scrambling it to preserve its security
Hashing it
Only on Textual data
only on ASCII coded data
On any Bit String
only on mnemonic data
one private key is used for both encryption and decryption
private and public key used are symmetric
only public keys are used for encryption
only symmetric key is used for encryption
Digital Evaluation System
Digital Encryption Standard
Digital Encryption System
Double Encryption Standard
It uses Two Keys
there is no key distribution problem as public key can be kept in a commonly accessible database.
Private Key can be Kept Secret
It is a Symmetric Key System.
His Public key
His Private Key
Receivers Public Key
Instance Principle
Internet Protocol
Instant Protocol
Intellectual Property
Authentication
Integrity
Confidentiality
All of the given options are correct
Non-repudiation
Integrity protection
Total Content Positioning
Transmission Control Protocol
Transmittable Constant Protocol
Technical Control Panel
Internet protocols
Network layers
Internet layers
Cryptographic protocols