Q.
1

a. Backdoor attack

b. Front door attack

c. Denial of service attack

d. Direct access attack

 

 

 

  • A

    a), b) and d)

     

  • B

    b), c) and d)

     

  • C

    a), b) and d)

     

  • D

    a), c) and d)