Ensures that the individual is who they claim to be
Anonymous Quiz
73%
Authentication
7%
Accounting
10%
Access control
10%
Certification
Availability :- identify the term which denotes the violation of principal if the computer is no more accessible
Anonymous Quiz
43%
False
57%
True
An independent malicious software that need not any host program
Anonymous Quiz
18%
Virus
6%
Dedan
70%
Worm
6%
Open Source Templates
Possible threat to any information cannot be
Anonymous Quiz
21%
Protected
9%
Reduced
9%
Transferred
61%
Ignored
Which of the following comes under network layers DOS flooding
Anonymous Quiz
3%
UDP flooding
18%
HTTP flooding
60%
SYN flooding
19%
All of above
the first phase of Hacking is
Anonymous Quiz
6%
Availability
12%
Authentication
9%
Output
73%
Information gathering
Viruses that are triggered by the passage of time or on a certain date
Anonymous Quiz
26%
Time Bob
3%
K-BOB
8%
Suga
63%
Time bombs
🤣6
In most cases integrity is enforced through
Anonymous Quiz
48%
Physical security
10%
Logical security
12%
Confidentiality
30%
Access control
👍1
After an attacker has probed a network for information the next step is to
Anonymous Quiz
68%
Penetrate any defense
17%
Circumstances are required
11%
He is wonderful
5%
None
👍1
In which category does compromising confidential information fall?
Anonymous Quiz
50%
Threat
13%
Bug
11%
Russi is great
26%
Attack
Which software is mainly used to detect viruses and avoid them
Anonymous Quiz
5%
Antinal
9%
Anticipate
8%
Anthony
78%
Anti-virus
🤣2
👍1