Operating system mcqs security program system threats

 

 DOWNLOAD ALL  PDF E-BOOK's    >>>CLICK HERE<<<

Operating system mcqs security program system threats

Click on any option to know the CORRECT ANSWERS



Question 1
With regard to DOS attack what is not true from below options?
A
We can stop DOS attack completely
B
By upgrading OS vulnerability we can stop DOS attack to some extent
C
DOS attack has to be stopped at network level
D
Such attack can last for hours
Commerce Study questions

Question 2
What is breach of availability?
A
This type of violation involves unauthorized reading of data
B
This violation involves unauthorized modification of data
C
This violation involves unauthorized destruction of data
D
This violation involves unauthorized use of resources
UPSC test Study questions

Question 3
What is Trojan horse?
A
It is a useful way to encrypt password
B
It is a user which steals valuable information
C
It is a rogue program which tricks users
D
It's a brute force attack algorithm
UPSC test Study questions

Question 4
What is theft of service?
A
This type of violation involves unauthorized reading of data
B
This violation involves unauthorized modification of data
C
This violation involves unauthorized destruction of data
D
This violation involves unauthorized use of resources
Arab culture Study questions



Question 5
Which is not a port scan type?
A
TCP scanning
B
SYN scanning
C
UDP scanning
D
SYSTEM Scanning
Library science Study questions

There are 5 questions to complete.

 

 DOWNLOAD ALL  PDF E-BOOK's    >>>CLICK HERE<<<