Question
In public key cryptography ___ Â key is
used for encryption and ____ key is used for decryption. Read the below passage and answer the questions Network Security refers to the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software systems. The basic principle of network security is protecting huge stored data and networks in layers that ensure the bedding of rules and regulations that have to be acknowledged before performing any activity on the data. These levels are: 1.     Physical Network Security 2.     Technical Network Security 3.     Administrative Network Security A _______(26)_______is a network security device, either hardware or software-based, which monitors all incoming and outgoing traffic and based on a defined set of security rules it accepts, rejects or drops that specific traffic.ÂSolution
The correct answer is C
What is the enactment date of Contract Act, 1872?
Which of the following are the powers and functions of the Authority as laid down under the PFRDA Act?
As per section 187 of the Contract Act an authority is said to be express when it is_________________
Contingent agreements to do or not to do anything, if an impossible event happens, are void ____________
The word “Of India” was added to the IRDA with effect from_______________________ as per the IRDA Act
The Specific Relief Act, 1963 came into force on______________
Provisions relating to inter-pleader suit are contained in ……..of CPC
As per section 46 of the Factories Act,1948__________ is to be provided if the factory is employing more than 250 employeesÂ
Who can delegate powers, by general or special order in writing, under the IRDA Act, 1999?
The Insurance Advisory Committee shall consist of_______________________