Operating System - Protection

16:  

Program threats are

A.

Trojan Horse

B.

trap doors

C.

both (a) and (b)

D.

none of these

 
 

Option: C

Explanation :

Click on Discuss to view users comments.

Write your comments here:



17:  

Protection against computer viruses is

A.

preventation

B.

practice of safe computing

C.

purchasing unopened software from vendors

D.

avoiding free or pirated copies from public sources

 
 

Option: D

Explanation :

Click on Discuss to view users comments.

Write your comments here:



18:  

Trojan Horse

A.

A code segment that misuses its file is called Trojan horse

B.

good for file accessing

C.

both (a) and (b)

D.

none of these

 
 

Option: A

Explanation :

Click on Discuss to view users comments.

Write your comments here:



19:  

Threat monitoring technique is

A.

the system can check for suspicious patterns of activity in an attempt to detect a security violation

B.

a time sharing a system that counts the number of incorrect passwords given

C.

both (a) and (b)

D.

none of these

 
 

Option: C

Explanation :

Click on Discuss to view users comments.

Write your comments here:



20:  

Trap door

A.

could be included in a compiler

B.

pose a difficult problem because, to detect them

C.

both (a) and (b)

D.

none of these

 
 

Option: C

Explanation :

Click on Discuss to view users comments.

Write your comments here: