How a user can be identified by?
a) user possession
b) user knowledge
c) user attributes
d) all of these
Which of the following is used for more security?
a) description
b) encryption
c) OTP
d) none of these
What does OTP stand for?
a) on-time password
b) one term password
c) one time password
d) on-term password
When an attempt is to make a machine or network resource
unavailable to its intended users, the attack is called…….
a) denial-of-service attack
b) slow read attack
c) spoofed attack
d) starvation attack
The code segment that misuses the environment is called…..
a) internal thief
b) trojan horse
c) code stacker
d) none of these
When a programmer leaves a hole in the software is called?
a) internal thief
b) trojan horse
c) trap door
d) none of these