A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
A. It is a useful way to encrypt password
B. It is a user which steals valuable information
C. It is a rogue program which tricks users
D. It’s a brute force attack algorithm
A. It is trap door in wargames
B. It is a hole in software left by designer
C. It is a trojan horse
D. It is a virus which traps and locks user terminal
A. Trap door
B. Fake process
C. Spawn process
D. Vax process
A. Virus destroy and modify user data
B. Virus is a standalone program
C. Virus is a code embedded in a legitimate program
D. Virus cannot be detected
Explanation: Virus can be detected by having an antivirus program.
A. When one participant in communication pretends to be someone else
B. When attacker modifies data in communication
C. When attack is of fraudulent repeat of a valid data
D. When attack gains access to remote systems
A. Robert morris
B. Bob milano
C. Mark zuckerberg
D. Bill gates