11. |
What is a trap door in a program?
|
||||||||
Answer:
Option (c) |
12. |
File virus attaches itself to the _____________
|
||||||||
Answer:
Option (c) |
13. |
From the following, which is not a common file permission?
|
||||||||
Answer:
Option (c) |
14. |
Which of the following is a good practice?
|
||||||||
Answer:
Option (d) |
15. |
Which of the following is a strong password?
|
||||||||
Answer:
Option (d) |
16. |
Which happens first authorization or authentication?
|
||||||||
Answer:
Option (a) |
17. |
What is theft of service?
|
||||||||
Answer:
Option (d) |
18. |
What is Trojan horse?
|
||||||||
Answer:
Option (c) |
19. |
What is trap door?
|
||||||||
Answer:
Option (b) |
20. |
What is used to protect network from outside internet access?
|
||||||||
Answer:
Option (c) |