BS Cyber Security

BE Cyber Security Quiz

138

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) in Cyber Security Quiz

BS (Hon) Cyber Security Quiz

1 / 25

Network  service  provider  includes ;-

2 / 25

In a compromised system , _________ provides the safest way to analyze it;-

3 / 25

The  types of  cyber  crime are  :-

4 / 25

What is the existence of weakness in a system is known as:-

5 / 25

Cryptanalysis is used ____________________:-

6 / 25

__________ comes under  tools  for  reverse engineering  ;-

7 / 25

Which  tech concept   can not  be sniffed :-

8 / 25

_________ performs  automated  DoS   attacks  on a targeted  web  address :-

9 / 25

When information is modified in unexpected way , the result is known as:-

10 / 25

A way to ensure that the entity is indeed when it claims to be:-

11 / 25

Which protocol consist of only one bit:-

12 / 25

In wireless network an extended service set is a set of :-

13 / 25

____________ needs  to  be  turned  off  in  order  to  prevent   from  this  attack  :-

14 / 25

Packet filtering are vulnerable to ______________:-

15 / 25

There are ____________ types of VPN protocols:

16 / 25

_______ ciphers can be categorized into two categories, monoalphabetic and polyalphabetic:-

17 / 25

What run command can you use to check what programs load on startup:-

18 / 25

An __________ algorithm transforms ciphertext to plain text;-

19 / 25

_________ is used in Directory Harvest Attack:-

20 / 25

Which UNIX account provides all type of privileges and rights which one can perform administrative functions:-

21 / 25

Trojan creators  do not look  for  securing  system  with  such program :-

22 / 25

A software program or hardware device that filters all data packets coming through the internet , a network. it is known as ;-

23 / 25

In order to infect a system , clicking an email attachment must cause _______________ conditions to occur:-

24 / 25

__________ is considered in the category of computer threat:-

25 / 25

Who is the father of computer security:-

Your score is