In computer security, ______ means that computer system assets can be modified only by authorized parities.
The ______ is a code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events.
1 Crore+ students have signed up on EduRev. Have you? Download the App |
Which of the following malicious program do not replicate automatically?
State whether true of false.
i. A worm mails a copy of itself to other systems.
ii. A worm executes a copy of itself on another system.
______ are used in denial of service attacks, typically against targeted websites.
A ______ attaches itself to executable files and replicates when the infected program is executed, by finding other executable files to infect.
A ______ creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
In ______, the virus places an identical copy of itself into other programs or into certain system areas on the disk.
The Internet poses specific security problems because:
The software that sits on the Internet analyzing Web traffic is referred to as a:
Tricking people into revealing their password by pretending to be legitimate users or members of a company in order to get information is called:
Which one of the following computer systems uses duplication of components and data to cope with system failures?
This document focuses on restoring computing and communication services after they have been disrupted by an event such as an earthquake.
7 videos|27 docs|69 tests
|
7 videos|27 docs|69 tests
|