IS4 PM_2025
Mark20Ciampa2020Security2B20Guide20to20Network20Security20Funda.pdf
لا تنسوا الأسئلة نهاية كل شابتر
مهمة جدًا للغاية
مهمة جدًا للغاية
💔3🔥2👌2❤1
Ensures that the individual is who they claim to be
Anonymous Quiz
73%
Authentication
7%
Accounting
10%
Access control
10%
Certification
Availability :- identify the term which denotes the violation of principal if the computer is no more accessible
Anonymous Quiz
43%
False
57%
True
An independent malicious software that need not any host program
Anonymous Quiz
18%
Virus
6%
Dedan
70%
Worm
6%
Open Source Templates
Possible threat to any information cannot be
Anonymous Quiz
21%
Protected
9%
Reduced
9%
Transferred
61%
Ignored
Which of the following comes under network layers DOS flooding
Anonymous Quiz
3%
UDP flooding
18%
HTTP flooding
60%
SYN flooding
19%
All of above
the first phase of Hacking is
Anonymous Quiz
6%
Availability
12%
Authentication
9%
Output
73%
Information gathering
Viruses that are triggered by the passage of time or on a certain date
Anonymous Quiz
26%
Time Bob
3%
K-BOB
8%
Suga
63%
Time bombs
🤣6
In most cases integrity is enforced through
Anonymous Quiz
48%
Physical security
10%
Logical security
12%
Confidentiality
30%
Access control
👍1