Operating system questions answers security

ALL PRINTABLE PDF BOOKS FREE DOWNLOAD <<CLICK HERE>>

ALL PRINTABLE PDF BOOKS FREE DOWNLOAD <<CLICK HERE>>

Operating system questions answers security

Question 1 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The code segment that misuses its environment is called a .....
A
internal thief
B
trojan horse
C
code stacker
D
none of the mentioned
Question 2 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In asymmetric encryption .....
A
same key is used for encryption and decryption
B
different keys are used encryption and decryption
C
no key is required for encryption and decryption
D
none of the mentioned
Question 3 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called .....
A
denial-of-service attack
B
slow read attack
C
spoofed attack
D
starvation attack
Question 4 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The internal code of any software that will set of a malicious function when specified conditions are met, is called .....
A
logic bomb
B
trap door
C
code stacker
D
none of the mentioned
Question 5 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which one of the following is a process that uses the spawn mechanism to revage the system performance?
A
worm
B
trojan
C
threat
D
virus
There are 5 questions to complete.

DOWNLOAD ALL SUBJECTS PDF <<CLICK HERE>>