Question
a.
Attack verification
b.
System specific acitvity
c.
No addition hardware required
d.
All of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What are strengths of the host based IDS ?
Similar Questions
Discover Related MCQs
Q. What are characteristics of stack based IDS ?
View solution
Q. What are characteristics of Network based IDS ?
View solution
Q. What are strengths of Network based IDS ?
View solution
Q. What is preferred way of encryption ?
View solution
Q. What is not a role of encryption ?
View solution
Q. What is cipher-block chaining ?
View solution
Q. What is not an encryption standard ?
View solution
Q. Which of following is not a stream cipher?
View solution
Q. What is a Hash Function ?
View solution
Q. MD5 produces __ bits hash data.
View solution
Q. SHA-1 produces __ bit of hash.
View solution
Q. Which two of the following are authentication algorithms ?
View solution
Q. What is role of Key Distribution Center ?
View solution
Q. In domain structure what is Access-right equal to ?
View solution
Q. What is meaning of right-set ?
View solution
Q. What is Domain ?
View solution
Q. What does access matrix represent ?
View solution
Q. What are the three additional operations to change the contents of the access-matrix ?
View solution
Q. Who can add new rights and remove some rights ?
View solution
Q. What are the three copy rights ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!

Operating System
Dive deep into the core of computers with our Operating System MCQs. Learn about...

Microprocessor
Understand the heart of your computer with our Microprocessor MCQs. Topics include...