CIS430 Unit 7 Self Quiz C16
Latest uploads at CIS430 Unit 7 Self Quiz C16. Looking for notes at CIS430 Unit 7 Self Quiz C16? We have lots of notes, study guides and study notes available for your school.
-
2
- 0
- 0
All courses for CIS430 Unit 7 Self Quiz C16
-
CIS430 Unit 7 Self Quiz C16 CIS430 Unit 7 Self Quiz C16 2
Latest notes & summaries CIS430 Unit 7 Self Quiz C16
Question 1
A software program that allows access to a system without going through the normal logon procedures is called back door.
True
False
Question 2
A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.
True
False
Response Feedback:
It is called a worm.
Question 3
The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.
True
False
Question 4
Encryption is the conv...
- Exam (elaborations)
- • 4 pages's •
-
CIS430 Unit 7 Self Quiz C16•CIS430 Unit 7 Self Quiz C16
Preview 1 out of 4 pages
Question 1
A software program that allows access to a system without going through the normal logon procedures is called back door.
True
False
Question 2
A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.
True
False
Response Feedback:
It is called a worm.
Question 3
The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.
True
False
Question 4
Encryption is the conv...
Question 1
A software program that allows access to a system without going through the normal logon procedures is called back door.
True
False
Question 2
A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.
True
False
Response Feedback:
It is called a worm.
Question 3
The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.
True
False
Question 4
Encryption is the conv...
- Exam (elaborations)
- • 4 pages's •
-
CIS430 Unit 7 Self Quiz C16•CIS430 Unit 7 Self Quiz C16
Preview 1 out of 4 pages
Question 1
A software program that allows access to a system without going through the normal logon procedures is called back door.
True
False
Question 2
A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.
True
False
Response Feedback:
It is called a worm.
Question 3
The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.
True
False
Question 4
Encryption is the conv...