A.Asymmetric ciphers use pre-shared keys B.Symmetric ciphers are faster to compute C.Asymmetric ciphers are faster to compute D.Asymmetric ciphers use public and private
A. policy based routing (PBR) B. unicast reverse path forwarding (uRPF) C. lock and keyACL D. RFC 1918filtering E. IP source routing
A. Man-in-themiddle attack B. Spoof attack C. Land.C attack D. Buffer Overflow E. Day zero attack F. Trojan Horse