Header Ads Widget

Responsive Advertisement

Computer System Security Week 6 quiz Solution [Cyber Security course on Prutor.ai]

Here you will get all the assignment and quiz solutions of Computer System Security Course by prutor.ai under the category Cyber Security. Prutor is an online smart tutoring platform which provides various MOOC courses for student and organised by by IIT Kharagpur. At the end of each course student gets a certificate for sucessfull  completion of each course but throughout the course students have to pass all the weekly assignments and quizes.

[1]Which of the following is the best possible name for backdoor virus?

  • (a) stealth
  • (b) Hidden key
  • (c) Rootkit
  • (d) Worm

Answer(c) Rootkit


[2] Once root access has been enabled, a rootkit may attempt to –

Answer:- All of the above




[3] Binary rootkits and library rootkits are the examples of –

Answer:- User mode rootkits


[4] Which of the following is not an attack tool?

Answer:- Rootkit Revealer


[5] Which of the following is incorrect for knark?

Answer:- It is a user mode rootkit


[6] Which of the following is the best characteristic of anomaly-based IDS?

Answer:- It models the normal usage of network as a noise characterization


[7] What are drawbacks of signature-based IDS?

Answer:-All of the above mentioned


[8] What of the following is a characteristic of Host based IDS?

Answer:- All of the above mentioned


[9] What are strengths of the host-based IDS?

Answer:-All of the above mentioned


[10] What of the following best characteristics stack based IDS ?

Answer:- They are integrated closely with the TCP/IP stack watch packets


[11] Which of the following is correct for compartmentalization?

Answer:- All of the above


[12] Which of the following is correct for principle of least privilege?

Answer:- Both A and B


[13] ______ uses a typical Unix approach with a large monolithic server and is known for the high complexity and previous security vulnerabilities.

Answer:- Sendmail


[14] Which of the following is a component of Qmail?

Answer:- All of the above


[15] In android process isolation, which process only run as root?

Answer:- Both A and B


Computer System Security 6th Week Solution is given below. the solution of Computer System Security 4rd Week Solution and all the answers are correct.

Post a Comment

0 Comments