info@avatto.com
+91-9920808017
16. Program threats are
Trojan Horse
trap doors
both (a) and (b)
none of these
Your email address will not be published. Required fields are marked *
Report
Name
Email
Website
Save my name, email, and website in this browser for the next time I comment.
Comment
17. Protection against computer viruses is
preventation
practice of safe computing
purchasing unopened software from vendors
avoiding free or pirated copies from public sources
18. Trojan Horse
A code segment that misuses its file is called Trojan horse
good for file accessing
19. Threat monitoring technique is
the system can check for suspicious patterns of activity in an attempt to detect a security violation
a time sharing a system that counts the number of incorrect passwords given
20. Trap door
could be included in a compiler
pose a difficult problem because, to detect them
Login with Facebook
Login with Google
Forgot your password?
Lost your password? Please enter your email address. You will receive mail with link to set new password.
Back to login