An independent malicious software that need not any host program
Anonymous Quiz
18%
Virus
6%
Dedan
70%
Worm
6%
Open Source Templates
Possible threat to any information cannot be
Anonymous Quiz
21%
Protected
9%
Reduced
9%
Transferred
61%
Ignored
Which of the following comes under network layers DOS flooding
Anonymous Quiz
3%
UDP flooding
18%
HTTP flooding
60%
SYN flooding
19%
All of above
the first phase of Hacking is
Anonymous Quiz
6%
Availability
12%
Authentication
9%
Output
73%
Information gathering
Viruses that are triggered by the passage of time or on a certain date
Anonymous Quiz
26%
Time Bob
3%
K-BOB
8%
Suga
63%
Time bombs
🤣6
In most cases integrity is enforced through
Anonymous Quiz
48%
Physical security
10%
Logical security
12%
Confidentiality
30%
Access control
👍1
After an attacker has probed a network for information the next step is to
Anonymous Quiz
68%
Penetrate any defense
17%
Circumstances are required
11%
He is wonderful
5%
None
👍1
In which category does compromising confidential information fall?
Anonymous Quiz
50%
Threat
13%
Bug
11%
Russi is great
26%
Attack
Which software is mainly used to detect viruses and avoid them
Anonymous Quiz
5%
Antinal
9%
Anticipate
8%
Anthony
78%
Anti-virus
🤣2
👍1
A replay attack
Anonymous Quiz
76%
Makes a copy of the transmission for use it later
11%
Can be in real life
6%
Can can a can but the can can not can it
6%
None
🤣2
To detect something unusual
Anonymous Quiz
58%
Scanning
23%
Phishing
17%
Sharking
2%
Baby shark du du du du
🤣4
Computer security is protection of the integrity availability and confidentiality of information system resources
Anonymous Quiz
94%
T
6%
F
Malicious software can be used to trick users into revealing sensitive personal data
Anonymous Quiz
89%
T
11%
F