1.
What is breach of integrity?
Answer: Option 'B'
This violation involves unauthorized modification of data
2.
What is theft of service?
Answer: Option 'D'
This violation involves unauthorized use of resources
3.
What is Trojan horse ?
Answer: Option 'C'
It is a rogue program which tricks users
4.
Which mechanism is used by worm process ?
Answer: Option 'C'
Spawn Process
5.
What is known as masquerading ?
Answer: Option 'A'
When one participant in communication pretends to be someone els
6.
What is port scanning?
Answer: Option 'B'
It is a software application designed to probe a server or host for open ports
7.
Which is not a valid port scan type?
Answer: Option 'C'
IGMP scan
8.
What is known as DOS attack?
Answer: Option 'C'
It is an attempt to make a machine or network resource unavailable
9.
With regard to DOS attack what is not true from below options?
Answer: Option 'A'
We can stop DOS attack completely
10.
What are zombie systems ?
Answer: Option 'C'
These systems are previously compromised, independent systems
11.
Which is not a port scan type?
Answer: Option 'D'
SYSTEM Scanning
12.
Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions?
Answer: Option 'A'
Robert Morris
13.
Which of the following is not a characteristic of virus ?
Answer: Option 'D'
Virus cannot be detected
14.
What is trap door ?
Answer: Option 'B'
It is a hole in software left by designer
15.
What is breach of availability ?
Answer: Option 'C'
This violation involves unauthorized destruction of data
16.
What is breach of confidentiality ?
Answer: Option 'A'
This type of violation involves unauthorized reading of data