Home

The _____________ are based on modification of the original message in some manner, or on creation of a false message.

A. Passive attack

B. Release of message content attack

C. Traffic analysis attack

D. Active attack

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. An orphan process is automatically inherited by the _____and becomes a _______ of this process.
  2. Fsck conducts a check in _____ phases
  3. Which of the following is suitable after you install new drivers?
  4. ____________ file system allows sharing in multiple different locations grouped under one folder.
  5. Having data belonging to two independent processes in the same page is called____________.
  6. Pick the wrong statement from the following.
  7. When a child dies, it sends a _______________signal to its parent.
  8. _____________ manage the name spaces and binds an object to its location.
  9. Choose the correct statement from the following.
  10. In the case of____________, message remains in the senders address space until the receiver executes…
  11. The time taken by the Dispatcher to stop one process and start another running is known as _________________.
  12. The _____________ are based on modification of the original message in some manner, or on creation of…
  13. A page fault occurs when
  14. _______________refers to a strategy where whenever a resource is requested, it is only granted if it…
  15. A shared memory segment first needs to be allocated (create, using the__________ system call.
  16. An unauthorized party inserts counterfeit objects into the system is called_________________
  17. The two sub systems of user mode layer of windows 2000 are _________ and __________
  18. In MS-DOS, the interfaces and levels of functionality are _______________
  19. Which of the following is/are external commands?
  20. ______________ is a situation in which two computer programs sharing the same resource are effectively…
  21. In ________________________ each node periodically sends a message to the time server.
  22. BSD stands for_____________________
  23. ______________ refers to the technology in which some space in hard disk is used as an extension of…
  24. Recently deleted files are stored in
  25. What is Dr. Watson?
  26. Windows 2000 supports -------------- type of file system
  27. RPN stands for
  28. A _____________is a collection of processors that do not share memory, peripheral devices,or a clock.
  29. A small part of taskbar that has icons of background running applications is
  30. Objects location is found by _________________