Q1. Which one of the following is not a mandatory access control?
Q2. If access to an object is controlled based on parameters such as location, time, and so on, then this type of access control is known as what?
Q3. Which one of the following is also called as a logic bomb?
Q4. Dictionary attack is a type of?
Q5. Basic functionality of the malicious code is to_______.
Q6. CAPTCHA is one of the popular mechanisms used by websites to control input to the access control system is supplied by humans and not machines. This mechanism is called Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Which type of machines is this access control system predominantly concerned with?
Q7. The Man-in-the-middle attack is an example of_______.
Q8. Hiding or showing menus in an application depending on the access permissions of a user is known as________.
3.144.26.138