System Administrator 2026
What are the various roles of protection?
- A. It is used to detect errors which can prevent contamination of system
- B. It is used used to accelerate a process
- C. It is used to optimize system downtime
- D. None of the mentioned
What is a trap door in a program?
- A. A security hole, inserted at programming time in the system for later use
- B. A type of antivirus
- C. Security hole in a network
- D. None of the mentioned
In asymmetric encryption _____________
- A. Same key is used for encryption and decryption
- B. Different keys are used encryption and decryption
- C. No key is required for encryption and decryption
- D. None of the mentioned