The security of a system can be improved by
A. | threat monitoring |
B. | audit log |
C. | both (a) and (b) |
D. | none of these |
Option: A Explanation : Click on Discuss to view users comments. |
Worm
A. | is a process that uses the spawn mechanism to clobber system performance |
B. | spawns copies of itself, using up system resources and perhaps locking out system use by all other processes. |
C. | both (a) and (b) |
D. | none of these |
Option: C Explanation : Click on Discuss to view users comments. |
An audit log
A. | simply records the time |
B. | user |
C. | type of all access to an object |
D. | all of these |
Option: D Explanation : Click on Discuss to view users comments. |