Protection on Operating System related Questions and Answers - Page 3

Question 21 : Multipartite viruses attack on
1. files
2. boot sector
3. memory
4. all of the mentioned
View Answer   Discuss with Members

Question 23 : Which one of the following is not an attack, but a search for vulnerabilities to attack?
1. denial of service
2. port scanning
3. memory access violation
4. dumpster diving
View Answer   Discuss with Members

Question 25 : Which one of the following is a process that uses the spawn mechanism to revage the system performance?
1. worm
2. trojan
3. threat
4. virus
View Answer   Discuss with Members

Question 26 : The pattern that can be used to identify a virus is known as
1. stealth
2. virus signature
3. armoured
4. multipartite
View Answer   Discuss with Members

Question 27 : The internal code of any software that will set of a malicious function when specified conditions are met, is called
1. logic bomb
2. trap door
3. code stacker
4. none of the mentioned
View Answer   Discuss with Members

Question 28 : The code segment that misuses its environment is called a
1. internal thief
2. trojan horse
3. code stacker
4. none of the mentioned
View Answer   Discuss with Members

Question 29 : When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called
1. denial-of-service attack
2. slow read attack
3. spoofed attack
4. starvation attack
View Answer   Discuss with Members

Question 30 : In UNIX, domain switch is accomplished via
1. file system
2. user
3. superuser
4. none of the mentioned
View Answer   Discuss with Members


View 21 - 30 of 51 Questions

* Be the First to Post a Comment.

Submit comment :


Captcha Image
Reload

Ask Question

Captcha Image
Reload

Note : Name and Email never shown.





Subscribe


Become a part of EducationForever. Subscribe to our FREE Newsletter