Question
a.
Authentication
b.
Databases
c.
Access control
d.
Authorization
Posted under IT Fundamentals
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Identification of a user must be verified by system by means of
Similar Questions
Discover Related MCQs
Q. For computer system's security a total approach involves
View solution
Q. A way to prohibit user from accessing information that user is not authorized to access is known to be
View solution
Q. Access control is granted to users after qualifying for
View solution
Q. Internal security of a system deals with
View solution
Q. Extension of computer executable file is
View solution
Q. Computer malicious program which is activated when a specific set of conditions is met is called
View solution
Q. Which of the following is not a cause of computer virus?
View solution
Q. All of the given below are anti virus programs except
View solution
Q. Virus reaches from one computer to another by
View solution
Q. Which of the following is computer virus?
View solution
Q. Program that interferes with the normal routine of the computer is called
View solution
Q. Example of computer anti virus program includes
View solution
Q. Special program which can detect and remove viruses from computer is called
View solution
Q. Viruses which executes when computer starts is
View solution
Q. Computer virus is simply a
View solution
Q. Which of the following is harmful for computer?
View solution
Q. In a computer, McAfee is a/an
View solution
Q. Person who gains illegal access to a computer system is known as
View solution
Q. Most computer crimes are committed by
View solution
Q. Example of a good password is
View solution
Suggested Topics
Are you eager to expand your knowledge beyond IT Fundamentals? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!