Operating system questions answers security

 

 Buy/Download all MCQ Ebook   >>>Click Here<<<

Operating system questions answers security

Click on any option to know the CORRECT ANSWERS

Question 1
The code segment that misuses its environment is called a .....
A
internal thief
B
trojan horse
C
code stacker
D
none of the mentioned
Reading comprehension Questions answers

Question 2
In asymmetric encryption .....
A
same key is used for encryption and decryption
B
different keys are used encryption and decryption
C
no key is required for encryption and decryption
D
none of the mentioned
English grammar Questions answers

Question 3
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called .....
A
denial-of-service attack
B
slow read attack
C
spoofed attack
D
starvation attack
Public administration Questions answers

Question 4
The internal code of any software that will set of a malicious function when specified conditions are met, is called .....
A
logic bomb
B
trap door
C
code stacker
D
none of the mentioned
GK Questions answers

Question 5
Which one of the following is a process that uses the spawn mechanism to revage the system performance?
A
worm
B
trojan
C
threat
D
virus
History Questions answers

There are 5 questions to complete.

 

 Buy/Download all MCQ Ebook >>>CLICK HERE<<<