MCQ of Computer Security with answer set – 2
1. …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse 2. Select...
1. …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse 2. Select...
1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Inte...
1. …………. Involves treating main memory as a resource to be allocated to and shared among a number of active processes. A) Partition manageme...
1. The unit of dispatching is usually referred to as a ………….. A) Thread B) Lightweight process C) Process D) Both A and B 2. ……………….. is a e...
1. .............. refers to a situation in which a process is ready to execute but is continuously denied access to a processor in deference...
1. All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window 2. The jdb is used to A) Cr...
1. The JDBC-ODBC bridge allows ……….. to be used as ……….. A) JDBC drivers, ODBC drivers B) Drivers, Application C) ODBC drivers, JDBC driver...
1. Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C) Transport Layer D) Internetwork laye...
1. ............... joins are SQL server default A) Outer B) Inner C) Equi D) None of the above 2. The ..................... is essentially u...
1. Which of the following is not the function of Micro kernel? A) File management B) Low-level memory management C) Inter-process communicat...
ط¬ظ…ظٹط¹ طظ‚ظˆظ‚ ط§ظ„ط·ط¨ط¹ ظˆط§ظ„ظ†ط´ط± © ظ…طظپظˆط¸ط© ظ„ظ…ظˆظ‚ط¹ for u