InterviewSolution
Saved Bookmarks
| 1. |
A list of protocols used is known as –(a) protocol access(b) protocol stack(c) permutation stack(d) none of the mentionedI had been asked this question in an internship interview.My query is from Topologies in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security |
|
Answer» Right OPTION is (b) protocol stack |
|