Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which one of the following can be considered as the class of computer threats?
Home
Secure Programming Practices
Which one of the following can be considered as the class of computer threats?
0
votes
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
Which one of the following can be considered as the class of computer threats?
A. Dos Attack
B. Phishing
C. Soliciting
D. Both A and C
user-authentication-interview-question
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Feb 6, 2022
by
GeorgeBell
Correct answer is : Dos Attack
Dos Attack
can be considered as the class of computer threats?
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Which of the following is considered as the unsolicited commercial email?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: What are the common security threats?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: _ is a type of software designed to help the user’s computer detect viruses and avoid them.
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Why is one time password safe ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is a strong password?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is a good practice?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: Which of the following is least secure method of authentication ?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: In which of the following, a person is constantly followed/chased by another person or group of several peoples?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
0
votes
Q: From the following, which is not a common file permission?
asked
Feb 6, 2022
in
Secure Programming Practices
by
GeorgeBell
user-authentication-interview-question
...