Q: WTLS stands for?
Solution: WTLS is Wireless Transport Security Layer. It provides security between the mobile device and the WAP gateway to internet.
Q: The protocol designed to make the security of wireless LAN as good as that of wired LAN.
Solution: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP protocol designed to make the security of wireless LAN as good as that of wired LAN.
Q: A person who enjoys learning details about computers and how to enhance their capabilities.
Solution: The person is called hacker. A person who enjoys learning the details of computer systems and how to stretch their capabilities is called hacker.
Q: A program created by Farmer and Venema for auditing capability.
Solution: SATAN is the Security analysis tool for auditing networks. It is created by farmer and venema.
Q: A small program that changes the way a computer operates.
Solution: The program is called virus. It alters the way that the computer operates. It often does damages like deleting and corrupting files and data.
Q: A program that copies itself.
Solution: A worm copies itself from one system to another over a network without the assistance of human.
Q: An attack in which the site is not capable of answering valid request.
Solution: The answer is Denial of service. In case of denial of service attacks, a computer site is bombarded with a lot of messages.
Q: Creating a computer or paper audit that can help detect wrong doings.
Solution: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can be used as a deterrent.
Q: An indirect form of surveillance.
Solution: Honey pot is an indirect form of surveillance. Network personnel create a trap, watching for unscrupulous acts.
Q: A malicious code hidden inside a seemingly harmless piece of code.
Solution: The answer is Trojan horse. Trojan horse is a code that is present in a program that appears harmless.
You Have Score    | /10 |