Question Tag: Computer Security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

MI – Nov 2015 – L1 – SA – Q15 – Information Systems Development and Security

Identifies the type of malicious software that attaches itself to other programs to replicate and cause damage.

A program that attaches itself to other programs in order to replicate and cause havoc on the attached programs is called:
A. Trojan horse
B. Worms
C. Worm
D. Virus
E. Trojan horses

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SA – Q15 – Information Systems Development and Security"

MI – May 2017 – L1 – SA – Q18 – Information System Development and Security

Identify the type of security measure that detects unauthorized operations.

In computer security, measures to sense and alert of unauthorized operation are called:
A. Detective
B. Deterrent
C. Recovery
D. Preventive
E. Adaptive

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2017 – L1 – SA – Q18 – Information System Development and Security"

MI – Nov 2015 – L1 – SA – Q15 – Information Systems Development and Security

Identifies the type of malicious software that attaches itself to other programs to replicate and cause damage.

A program that attaches itself to other programs in order to replicate and cause havoc on the attached programs is called:
A. Trojan horse
B. Worms
C. Worm
D. Virus
E. Trojan horses

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SA – Q15 – Information Systems Development and Security"

MI – May 2017 – L1 – SA – Q18 – Information System Development and Security

Identify the type of security measure that detects unauthorized operations.

In computer security, measures to sense and alert of unauthorized operation are called:
A. Detective
B. Deterrent
C. Recovery
D. Preventive
E. Adaptive

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2017 – L1 – SA – Q18 – Information System Development and Security"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan