MCQs
Total Questions : 69
| Page 2 of 7 pages
Answer: Option C. -> These systems are previously compromised, independent systems
None.
Answer: Option C. -> It is an attempt to make a machine or network resource unavailable.
None.
Answer: Option C. -> IGMP scan
None.
Answer: Option A. -> We can stop DOS attack completely
None.
Answer: Option A. -> Large amount of RAM to support antivirus
RAM has no effect on security of a system. System's protection remains unchanged in increasing or decreasing amount of RAM.
Answer: Option B. -> It generates many false alarms
None.
Answer: Option C. -> Data is logically 'XORed' with previous block
None.
Answer: Option D. -> It is used to ensure data corruption doesn't happens
Encryption doesn't have error correction or detection facility thus cannot be used to safeguard from data corruption.
Answer: Option C. -> public key-encryption
None.