In which year computer scientists try to integrate encryption techniques in TCP/IP protocol?
The question was posed to me in an interview for internship.
The question is from Ethical Hacking in portion Introduction to Ethical Hacking of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,