1.
Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
2.
Suppose an employee demands the root access to a UNIX system, where you are the administrator; that right or access should not be given to the employee unless that employee has work that requires certain rights, privileges. It can be considered as a perfect example of which principle of cyber security?
3.
Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created?
4.
Which one of the following principles of cyber security refers that the security mechanism must be as small and simple as possible?
5.
Which of the following is considered as the world's first antivirus program?
6.
When was the first computer virus created?
7.
Which of the following statements is correct about the firewall?
8.
In the computer networks, the encryption techniques are primarily used for improving the ________
9.
Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit?
10.
The response time and transit time is used to measure the ____________ of a network.