Top

Computer Security

Answer: B

No answer description available for this question
 

Enter details here

Answer: B

No answer description available for this question

Enter details here

Answer: B

No answer description available for this question

Enter details here

34.

Confidentiality with asymmetric-key cryptosystem has its own

Answer: C

No answer description available for this question
 

Enter details here

35.

All of the following are examples of real security and privacy risks EXCEPT

Answer: A

No answer description available for this question

Enter details here

36.

SHA-l has a message digest of

Answer: A

No answer description available for this question

Enter details here

37.

Which among the following is independent malicious program that need not any host program?

Answer: D

No answer description available for this question
 

Enter details here

38.

The virus that spread in application software is called as

Answer: B

No answer description available for this question

Enter details here

Answer: C

No answer description available for this question

Enter details here

40.

A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.

Answer: D

No answer description available for this question

Enter details here

Loading…
Tags: Computer Security Questions and Answers || Computer Security MCQ Questions and Answers || Computer Security GK Questions and Answers || Computer Security GK MCQ Questions || Computer Security Multiple Choice Questions and Answers || Computer Security GK || GK on Computer Security || Computer Awareness Questions and Answers || Computer Awareness MCQ Questions and Answers || Computer Awareness GK Questions and Answers || GK on Computer Awareness