Question Bank all jobs

1. Trap door

2. Threat monitoring technique is

3. Trojan Horse

4. Protection against computer viruses is

5. Program threats are

6. Viruses

7. In one time password

8. Viruses

9. The most common approach to authenticating a user identity is

10. Boot strap or vector is called

Ans.
1 3
2 3
3 1
4 4
5 3
6 1
7 1
8 4
9 1
10 1