System Administrator 2026
What are the various roles of protection?
  • A. It is used to detect errors which can prevent contamination of system
  • B. It is used used to accelerate a process
  • C. It is used to optimize system downtime
  • D. None of the mentioned
The code segment that misuses its environment is called a _____________
  • A. Internal thief
  • B. Trojan horse
  • C. Code stacker
  • D. None of the mentioned
The pattern that can be used to identify a virus is known as _____________
  • A. Stealth
  • B. Virus signature
  • C. Armoured
  • D. Multipartite
What is a trap door in a program?
  • A. A security hole, inserted at programming time in the system for later use
  • B. A type of antivirus
  • C. Security hole in a network
  • D. None of the mentioned
Which one of the following is not an attack, but a search for vulnerabilities to attack?
  • A. Denial of service
  • B. Port scanning
  • C. Memory access violation
  • D. Dumpster diving
Multipartite viruses attack on _____________
  • A. Files
  • B. Boot sector
  • C. Memory
  • D. All of the mentioned
In asymmetric encryption _____________
  • A. Same key is used for encryption and decryption
  • B. Different keys are used encryption and decryption
  • C. No key is required for encryption and decryption
  • D. None of the mentioned
In distributed system, each processor has its own ___________
  • A. Local memory
  • B. Clock
  • C. Both local memory and clock
  • D. None of the mentioned