Contents

How a user can be identified by?
a) user possession               
b) user knowledge
c) user attributes 
d) all of these


d

Which of the following is used for more security?
a) description                       
b) encryption
c) OTP                                   
d) none of these


b

What does OTP stand for?
a) on-time password
b) one term password
c) one time password        
d) on-term password


c

When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called…….
a) denial-of-service attack                              
b) slow read attack
c) spoofed attack               
d) starvation attack


a

The code segment that misuses the environment is called…..
a) internal thief   
b) trojan horse
c) code stacker    
d) none of these

b

When a programmer leaves a hole in the software is called?
a) internal thief   
b) trojan horse
c) trap door                         
d) none of these

c