Question
a.
RADIUS and RSA
b.
3 way handshaking with syn and fin
c.
Multilayered protection for securing resources
d.
Deals with privileges and rights
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is characteristics of Authorization ?
Similar Questions
Discover Related MCQs
Q. What forces the user to change password at first logon ?
View solution
Q. What is not a best practice for password policy ?
View solution
Q. What is breach of integrity ?
View solution
Q. What is breach of confidentiality ?
View solution
Q. What is theft of service ?
View solution
Q. What is breach of availability ?
View solution
Q. What is Trojan horse ?
View solution
Q. What is trap door ?
View solution
Q. Which mechanism is used by worm process ?
View solution
Q. Which of the following is not a characteristic of virus ?
View solution
Q. What is known as masquerading ?
View solution
Q. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?
View solution
Q. What is port scanning ?
View solution
Q. Which is not a port scan type ?
View solution
Q. Which is not a valid port scan type ?
View solution
Q. What are zombie systems ?
View solution
Q. What is known as DOS attack ?
View solution
Q. With regard to DOS attack what is not true from below options ?
View solution
Q. What is not a important part of security protection ?
View solution
Q. What is used to protect network from outside internet access ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!