Patents are designed to protect…….
a) inventions
b) business identity
c) literary content
d) artistic expression
Which of the following are typically protected via trademark?
a) inventions
b) business identity
c) literary content
d) artistic expression
A process of sending high volume of requests to a system so the system cannot hand legitimate users is called…….
a) data diddling
b) zapping
c) denial of service
d) bombing
A program placed for legitimate program for unauthorized and hidden access to system is called……
a) worm
b) worm
c) trapdoor
d) bomb
If a legitimate user does not log off from system, an illegitimate user may be involved…
a) piggy backing
b) zapping
c) scavenging
d) trapdoor
Zapping software is used for…….
a) bypass security system
b) checking virus on system
c) destroy sensitive data
d) none of these