Question
a.
Unauthorized attacks
b.
Virus attacks
c.
Data-driven attacks
d.
Fire-attacks
Posted under IT Fundamentals
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Firewalls are used to protect a communication network system against
Similar Questions
Discover Related MCQs
Q. Which of the following is type of LAN ?
View solution
Q. Bluetooth technology allows:
View solution
Q. Which supercomputer is developed by the Indian Scientists ?
View solution
Q. 'OS' in computer system means ?
View solution
Q. '.MOV' extension refers to:
View solution
Q. '.MPG' extension refers to:
View solution
Q. File extensions are used in order to ……….
View solution
Q. Bit stands for
View solution
Q. Which one of the following is not a linear data structure ?
View solution
Q. Which one of the following is different from other members ?
View solution
Q. Computers on an internet are identified by
View solution
Q. Which one of the following is not an Internet Service Provider (ISP) ?
View solution
Q. Yahoo was developed by:
View solution
Q. The octal number system consists of the following symbols:
View solution
Q. Which of the following operating system is used on mobile phones ?
View solution
Q. If (y)x represents a number y in base x, then which of the following numbers is smallest of all ?
View solution
Q. HTML is used to create
View solution
Q. I/O is the communication between an ___________ and the outside world.
View solution
Q. I/O is short form of ___________.
View solution
Q. Which of the following if not OS ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!