Home
Mcqs
Quizes
Q&A
Past Paper
blog
Spaces
Join Now
Sign in
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Cybersecurity
Which of the following malware types does not infect others and duplicate or clone itself?
A. Rootkits.
B. Trojans.
C. Worms.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Cybersecurity
After a certain amount of time, say thirty minutes, the online application, similar to banking websites, should prompt users to log in again. Which cybersecurity concept is this an example of?
A. Compromise recording.
B. Psychological acceptability.
C. Complete mediation.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Cybersecurity
If an employee requests root access to a UNIX system in which you serve as the administrator, you shouldn't provide them access or this authority unless their job necessitates it. Which cybersecurity notion is this an example of?
A. Least privileges.
B. Separation of Privileges.
C. Open Design.
D. None of these.
Tamoban Javnoi
COMPUTER SCIENCE & IT
-
Cybersecurity
Which of the following is considered as the world's first antivirus program?
A. Tinkered.
B. Reaper.
C. Creeper.
D. None of these.
COMPUTER SCIENCE & IT
Web Design & Development
Database Management Systems
Computer Networks & Security
Operating Systems
Data Structures & Algorithms
Information Systems Auditing Process
Governance and Management of Information Technology
Information Systems Acquisition Development & Implementation
Information Systems Operations and Business Resilience
Protection of Information Assets
Programming
Cybersecurity
Software Engineering