Part-3

1. ______means that a sender must not be able to deny sending a message that he sent.

 
 
 
 

2. means to prove/verify the identity of the entity that tries to access the system’s resources.

 
 
 
 

3. A______creates copies during replication that are
functionally equivalent but have distinctly different bit patterns.

 
 
 
 

4. Which protection method is used to monitoring who
can access the data for what purpose?

 
 
 
 

5. Which of the following virus overtake computer
system, when it boots and destroy information?

 
 
 
 

6. Standardisation of Microsoft programs and the
Windows operating system has made the spread of
Viruses.

 
 
 
 

7. Viruses, Trojan horses and worms are

 
 
 
 

8. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?

 
 
 
 

9. ______is/are the branch of information technology which is intended to protect computers.

 
 
 
 

10. Which of the following is independent malicious
program that need not any host program?

 
 
 
 

Question 1 of 10