BS Cyber Security BE Cyber Security Quiz 138 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) in Cyber Security Quiz BS (Hon) Cyber Security Quiz 1 / 25 Network service provider includes ;- None of them Originator Addressee 2 / 25 In a compromised system , _________ provides the safest way to analyze it;- Live CD/DVD Resident Antivirus Programs Live USB 3 / 25 The types of cyber crime are :- computer as weapon Both of them Peer to peer attack 4 / 25 What is the existence of weakness in a system is known as:- Vulnerability Attack Exploit 5 / 25 Cryptanalysis is used ____________________:- to encrypt the data to find some insecurity in a cryptographic scheme to increase the speed 6 / 25 __________ comes under tools for reverse engineering ;- Compiler Reassembler Disassembler 7 / 25 Which tech concept  can not be sniffed :- FTP session Talnet session Cloud session 8 / 25 _________ performs automated DoS  attacks on a targeted web address :- DDoS Trojan Trojan Banker Backdoor Trojan 9 / 25 When information is modified in unexpected way , the result is known as:- loss of availability loss of integrity loss of confidentiality 10 / 25 A way to ensure that the entity is indeed when it claims to be:- identification accountability Authentication 11 / 25 Which protocol consist of only one bit:- alert protocol handshake protocol upper layer protocol change cipher spec protocol 12 / 25 In wireless network an extended service set is a set of :- all stations all access point Connected basic service aets 13 / 25 ____________ needs to be turned off in order to prevent  from this attack :- E mail server Email scripting Email attachment 14 / 25 Packet filtering are vulnerable to ______________:- spoofing mitm phishing hardware vulnerabilities 15 / 25 There are ____________ types of VPN protocols: 3 4 6 5 16 / 25 _______ ciphers can be categorized into two categories, monoalphabetic and polyalphabetic:- Transposition either a, b Substitution 17 / 25 What run command can you use to check what programs load on startup:- CMD msconfig Ipconfig 18 / 25 An __________ algorithm transforms ciphertext to plain text;- Encryption decryption Both a, b 19 / 25 _________ is used in Directory Harvest Attack:- Trojan Worms Brute Force 20 / 25 Which UNIX account provides all type of privileges and rights which one can perform administrative functions:- Root Guest Administrative Client 21 / 25 Trojan creators do not look for securing system with such program :- False True 22 / 25 A software program or hardware device that filters all data packets coming through the internet , a network. it is known as ;- Antivirus Firewall Cookies 23 / 25 In order to infect a system , clicking an email attachment must cause _______________ conditions to occur:- the attachment executes the attachment is saved to the disk the attachment is decompressed 24 / 25 __________ is considered in the category of computer threat:- Phishing DoS attack Soliciting 25 / 25 Who is the father of computer security:- August Kerckhoffs Robert Bob Thomas Your score is Restart quiz