A. Internal thief
B. Trojan horse
C. Code stacker
D. None of the mentioned
A. Logic bomb
B. Trap door
C. Code stacker
D. None of the mentioned
A. Stealth
B. Virus signature
C. Armoured
D. Multipartite
A. Worm
B. Trojan
C. Threat
D. Virus
A. A security hole, inserted at programming time in the system for later use
B. A type of antivirus
C. Security hole in a network
D. None of the mentioned
A. Denial of service
B. Port scanning
C. Memory access violation
D. Dumpster diving
A. Files
B. Boot sector
C. Memory
D. All of the mentioned
A. Same key is used for encryption and decryption
B. Different keys are used encryption and decryption
C. No key is required for encryption and decryption
D. None of the mentioned