Computer System Security 6th Week Solution

0
2620
computer-system-security-6th-week-solution
computer-system-security-6th-week-solution

Disclaimer for ReGyan

If you require any more information or you have any problem regarding Copyright or have any questions about our site’s disclaimer, please feel free to contact us by email at [email protected].

 


Disclaimers for ReGyan

All the information on this website is published in good faith and for general information and educational purpose only. ReGyan does not make any warranties about the completeness, reliability, and accuracy of this information. Any action you take upon the information you find on this website (regyan.com), is strictly at your own risk. will not be liable for any losses and/or damages in connection with the use of our website.

Computer System Security 6th Week Solution is given below.




Also See:- Computer System Security 7th Week Solution

Also See:- NLC Recruitment 2020 Apply Online 330 Assistant Manager

[1]Which of the following is the best possible name for backdoor virus?

  • (a) stealth
  • (b) Hidden key
  • (c) Rootkit
  • (d) Worm

Answer(c) Rootkit

[2] Once root access has been enabled, a rootkit may attempt to –

Answer:- All of the above




[3] Binary rootkits and library rootkits are the examples of –

Answer:- User mode rootkits

[4] Which of the following is not an attack tool?

Answer:- Rootkit Revealer

[5] Which of the following is incorrect for knark?

Answer:- It is a user mode rootkit

[6] Which of the following is the best characteristic of anomaly-based IDS?

Answer:- It models the normal usage of network as a noise characterization

[7] What are drawbacks of signature-based IDS?

Answer:-All of the above mentioned

[8] What of the following is a characteristic of Host based IDS?

Answer:- All of the above mentioned

[9] What are strengths of the host-based IDS?

Answer:-All of the above mentioned

[10] What of the following best characteristics stack based IDS ?

Answer:- They are integrated closely with the TCP/IP stack watch packets

[11] Which of the following is correct for compartmentalization?

Answer:- All of the above

[12] Which of the following is correct for principle of least privilege?

Answer:- Both A and B

[13] ______ uses a typical Unix approach with a large monolithic server and is known for the high complexity and previous security vulnerabilities.

Answer:- Sendmail

[14] Which of the following is a component of Qmail?

Answer:- All of the above

[15] In android process isolation, which process only run as root?

Answer:- Both A and B
Computer System Security 6th Week Solution is given below. the solution of Computer System Security 4rd Week Solution and all the answers are correct.

LEAVE A REPLY

Please enter your comment!
Please enter your name here