Technical preparation

CSE MCQ

81. Worm was made up

82. An audit log

83. The security of a system can be improved by

84. Trap door

85. Threat monitoring technique is

86. Trojan Horse

87. Protection against computer viruses is

88. Program threats are

89. Viruses

90. In one time password

91. Viruses

92. The most common approach to authenticating a user identity is

93. Boot strap or vector is called

94. A major security problem for operating system is

95. Real-time displays

96. Global locks

97. Control-unit busy

98. A long-term process display should

99. Device busy

100. A long-term monitor