Question Bank all jobs

1. Two programs of worm are

2. Audit log can be used to

3. Worm was made up

4. An audit log

5. The security of a system can be improved by

6. Trap door

7. Threat monitoring technique is

8. Trojan Horse

9. Protection against computer viruses is

10. Program threats are

Ans.
1 3
2 4
3 2
4 4
5 1
6 3
7 3
8 1
9 4
10 3