Operating System - Protection

21:  

The security of a system can be improved by

A.

threat monitoring

B.

audit log

C.

both (a) and (b)

D.

none of these

 
 

Option: A

Explanation :

Click on Discuss to view users comments.

Write your comments here:



22:  

Worm

A.

is a process that uses the spawn mechanism to clobber system performance

B.

spawns copies of itself, using up system resources and perhaps locking out system use by all other processes.

C.

both (a) and (b)

D.

none of these

 
 

Option: C

Explanation :

Click on Discuss to view users comments.

Write your comments here:



23:  

An audit log

A.

simply records the time

B.

user

C.

type of all access to an object

D.

all of these

 
 

Option: D

Explanation :

Click on Discuss to view users comments.

Write your comments here:



24:  

Worm was made up

A.

one program

B.

two programs

C.

three programs

D.

all of these

 
 

Option: B

Explanation :

Click on Discuss to view users comments.

Write your comments here:



25:  

Audit log can be used to

A.

determine how and when the problem occurred

B.

what amount of damage was done

C.

when security has been violated

D.

all of these

 
 

Option: D

Explanation :

Click on Discuss to view users comments.

Write your comments here: