Program threats are
A. | Trojan Horse |
B. | trap doors |
C. | both (a) and (b) |
D. | none of these |
Option: C Explanation : Click on Discuss to view users comments. |
Protection against computer viruses is
A. | preventation |
B. | practice of safe computing |
C. | purchasing unopened software from vendors |
D. | avoiding free or pirated copies from public sources |
Option: D Explanation : Click on Discuss to view users comments. |
Trojan Horse
A. | A code segment that misuses its file is called Trojan horse |
B. | good for file accessing |
C. | both (a) and (b) |
D. | none of these |
Option: A Explanation : Click on Discuss to view users comments. |
Threat monitoring technique is
A. | the system can check for suspicious patterns of activity in an attempt to detect a security violation |
B. | a time sharing a system that counts the number of incorrect passwords given |
C. | both (a) and (b) |
D. | none of these |
Option: C Explanation : Click on Discuss to view users comments. |