MCQ of Computer Security with answer set – 2
1. …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse 2. Select...
مزيد من المعلومات »-->
1. …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse 2. Select...
مزيد من المعلومات »1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Inte...
مزيد من المعلومات »1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition manageme...
مزيد من المعلومات »1. The unit of dispatching is usually referred to as a ………….. A) Thread B) Lightweight process C) Process D) Both A and B 2. ……………….. is a e...
مزيد من المعلومات »1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference...
مزيد من المعلومات »1. All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window 2. The jdb is used to A) Cr...
مزيد من المعلومات »1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC drivers B) Drivers, Application C) ODBC drivers, JDBC driver...
مزيد من المعلومات »1. Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork laye...
مزيد من المعلومات »1. ............... joins are SQL server default A) Outer B) Inner C) Equi D) None of the above 2. The ..................... is essentially u...
مزيد من المعلومات »1. Which of the following is not the function of Micro kernel? A) File management B) Low-level memory management C) Inter-process communicat...
مزيد من المعلومات »