Operating System — Test 31
Page 1 of 3
Question 1
When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called _____________
0
System Administrator 2026
Question 2
The code segment that misuses its environment is called a _____________
0
System Administrator 2026
Question 3
The internal code of any software that will set of a malicious function when specified conditions are met, is called _____________
0
System Administrator 2026
Question 4
The pattern that can be used to identify a virus is known as _____________
0
System Administrator 2026
Question 5
Which one of the following is a process that uses the spawn mechanism to revage the system performance?
0
System Administrator 2026
Question 6
What is a trap door in a program?
0
System Administrator 2026
Question 7
Which one of the following is not an attack, but a search for vulnerabilities to attack?
0
System Administrator 2026
Question 8
File virus attaches itself to the _____________
0
System Administrator 2026
Question 9
Multipartite viruses attack on _____________
0
System Administrator 2026
Question 10
In asymmetric encryption _____________
0
System Administrator 2026