Question
a.
This type of violation involves unauthorized reading of data
b.
This violation involves unauthorized modification of data
c.
This violation involves unauthorized destruction of data
d.
This violation involves unauthorized use of resources
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is breach of availability ?
Similar Questions
Discover Related MCQs
Q. What is Trojan horse ?
View solution
Q. What is trap door ?
View solution
Q. Which mechanism is used by worm process ?
View solution
Q. Which of the following is not a characteristic of virus ?
View solution
Q. What is known as masquerading ?
View solution
Q. Who unleashed famous worm attack in 1988 which effected UNIX systems and caused losses in millions ?
View solution
Q. What is port scanning ?
View solution
Q. Which is not a port scan type ?
View solution
Q. Which is not a valid port scan type ?
View solution
Q. What are zombie systems ?
View solution
Q. What is known as DOS attack ?
View solution
Q. With regard to DOS attack what is not true from below options ?
View solution
Q. What is not a important part of security protection ?
View solution
Q. What is used to protect network from outside internet access ?
View solution
Q. What is best practice in firewall domain environment ?
View solution
Q. Which direction access cannot happen using DMZ zone by default ?
View solution
Q. What are two features of a tripwire file system ?
View solution
Q. How do viruses avoid basic pattern match of antivirus ?
View solution
Q. How does an antivirus of today identify viruses ?
View solution
Q. What is known as sandbox ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!