BS Cyber Security BE Cyber Security Quiz 139 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) in Cyber Security Quiz BS (Hon) Cyber Security Quiz 1 / 25 Misuse of digital signatures of fraudulent purposes comes under ______________ of IT Act:- section 66 section 72 section 71 section 65 2 / 25 ________ is a web application  assessment security tool :- LC4 Webinspect Ettercap 3 / 25 De compilation is not done for targeting users  with stealing code :- False True 4 / 25 ISAKMP stands for:- Internet Security association and key management protocol Both a, b Interchange system and key modeling protocol 5 / 25 ________ is used to entangle spammers:- MDA Honey pots Spam mails 6 / 25 In cyber security there are _____________ types of scanning:- 2 3 4 1 7 / 25 There are ____________ type of exploit :- 3 5 2 8 / 25 Which is not a web server attack type- Password guessing DoS attack Directory Traversal 9 / 25 What is updated  version of the IT Act  2000:- IT Act  2008 IT Act  2009 IT Act  2007 10 / 25 Session Hijacking  takes place at ___________ number of levels :- 5 4 2 11 / 25 Which is a session Hijacking tool :- Maltego Wireshark T sight 12 / 25 Which is a stuxnet:- Trojan Worm Antivirus 13 / 25 Which technique would be effective in helping to prevent phishing attack by scammer:- Allow XSS Scan for and fix XSS issues Use IFRAME's 14 / 25 Which event is not possible in wireless LAN:- Acknowledgement of data frames Collision detection Multi mode data transmission 15 / 25 Malicious adware may sneak into your  system by ___________ different  ways ;- 2 5 4 16 / 25 In tunnel mode, IPSec protect the ____________:- ipsec ssl pgp 17 / 25 In symmetric schemes requires both parties to share how many secret keys:- 1 2 4 3 18 / 25 SSL provides:- Compression message integrity Confidentiality all of them 19 / 25 ___________ means knowledge obtained from investigation , study, intelligence new facts:- information data Security 20 / 25 Machine learning benefits IDSec/IPSec by searching for similar patterns to know attacks;- True False 21 / 25 Firewall is a type of___________:- Woem Virus None of them Security threat 22 / 25 Conventional  cryptography is also known as  _______________ or symmetric key encryption;- Secret key Public key Protected key 23 / 25 Trojans  can not self replicate :- True False 24 / 25 In term of web security Threats, ' Impersonation of another use' is a passive attack:- false true 25 / 25 ________ functions creates a message digest out of a message:- decryption hash encryption Your score is Restart quiz