info@avatto.com
+91-9920808017
21. The security of a system can be improved by
threat monitoring
audit log
both (a) and (b)
none of these
Your email address will not be published. Required fields are marked *
Report
Name
Email
Website
Save my name, email, and website in this browser for the next time I comment.
Comment
22. Worm
is a process that uses the spawn mechanism to clobber system performance
spawns copies of itself, using up system resources and perhaps locking out system use by all other processes.
23. An audit log
simply records the time
user
type of all access to an object
all of these
24. Worm was made up
one program
two programs
three programs
25. Audit log can be used to
determine how and when the problem occurred
what amount of damage was done
when security has been violated
Login with Facebook
Login with Google
Forgot your password?
Lost your password? Please enter your email address. You will receive mail with link to set new password.
Back to login