1.
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called
Answer: Option 'A'
denial-of-service attack
2.
The code segment that misuses its environment is called a
Answer: Option 'B'
trojan horse
3.
The internal code of any software that will set of a malicious function when specified conditions are met, is called
Answer: Option 'A'
logic bomb
4.
Which one of the following is a process that uses the spawn mechanism to revage the system performance?
Answer: Option 'B'
worm
5.
The pattern that can be used to identify a virus is known as
Answer: Option 'B'
virus signature
6.
What is a trap door in a program?
Answer: Option 'A'
a security hole, inserted at programming time in the system for later use
7.
Which one of the following is not an attack, but a search for vulnerabilities to attack?
Answer: Option 'B'
port scanning
8.
File virus attaches itself to the
Answer: Option 'C'
executable file
9.
Multipartite viruses attack on
Answer: Option 'D'
all of the mentioned
10.
In asymmetric encryption
Answer: Option 'B'
different keys are used encryption and decryption