Operating System » Security Program System Threats
What is the breach of integrity?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources

What is breach of confidentiality?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources

What is theft of service?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources

What is breach of availability?

A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources

What is Trojan horse?

A. It is a useful way to encrypt password
B. It is a user which steals valuable information
C. It is a rogue program which tricks users
D. It’s a brute force attack algorithm

What is trap door?

A. It is trap door in wargames
B. It is a hole in software left by designer
C. It is a trojan horse
D. It is a virus which traps and locks user terminal

Which mechanism is used by worm process?

A. Trap door
B. Fake process
C. Spawn process
D. Vax process

Which of the following is not a characteristic of a virus?

A. Virus destroy and modify user data
B. Virus is a standalone program
C. Virus is a code embedded in a legitimate program
D. Virus cannot be detected

Explanation: Virus can be detected by having an antivirus program.

What is known as masquerading?

A. When one participant in communication pretends to be someone else
B. When attacker modifies data in communication
C. When attack is of fraudulent repeat of a valid data
D. When attack gains access to remote systems