1. Can a stream cipher have perfect secrecy?
2. ___________________ is alike as that of Access Point (AP) from 802.11, & the mobile operators uses it for offering signal coverage.
3. Which of the following is not a security exploit?
4. What is a web proxy?
5. The ______________ is categorized as an unknown segment of the Deep Web which has been purposely kept hidden & is inaccessible using standard web browsers.
