BE Cyber Security Quiz 0 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) in Cyber Security Quiz BS (Hon) Cyber Security Quiz 1 / 25 Conversion of cypher text to plain text:- Encryption simple text decryption 2 / 25 False positive is an alert that indicates nefarious activity on a system that , upon further inspection, turns out torepresent legitimate network traffic:- False True 3 / 25 Expand WAN:- World Area Network Web Area Network Wide Area Network 4 / 25 ________________ usually observe each activity on the internet of the victim;- spyware malware adware 5 / 25 _________ is not an example of spyware tool:- Spyhot Kazaa Ad-Aware Windows Defender 6 / 25 In the________ mode, IPSec protect the whole IP packets, including the original IP header:- Transport Tunnel Both a, b 7 / 25 Automated spamming tools subscribe to mail list in order to complete_____________ task:- collect email addresses Both a, b deny services to mail list recipient 8 / 25 It can be a soften program that filters all data packets coming through the internet:- Firewall Antivirus Cookies 9 / 25 In cryptography the order of the letters in message is rearranged by;- Both a, b transpositional ciphers Substitution cipher 10 / 25 Macro virus depends on applications to propagate:- Yes No 11 / 25 Release of message content and traffic analysis are two types of ____________ attacks:- active attacks modification of attacks passive attacks 12 / 25 ___________ means knowledge obtained from investigation , study, intelligence new facts:- Security information data 13 / 25 An attempt to make a computer resources unavailable to its intended users is called:- virus attack denial service attack worm attack 14 / 25 The term ' CHAP' stands for:- Challenge Hardware Authentication Protocol Challenge Handshake Authentication Protocol Circuit Hardware Authentication Protocol 15 / 25 Which one is not a higher -layer SSL protocol:- alert protocol handshake protocol alarm protocol 16 / 25 Which is considered as the first hacker's conference :- OSCON DEVON DEFCON 17 / 25 When integrity is lacking in a security system:- data deletion database hacking data tempering 18 / 25 Circuit level gateway firewalls are installed in ______________ layer of OSI model:- Session layer Presentation layer Application layer 19 / 25 Which is known as the oldest phone hacking technique:- Phreaking Phishing Cracking 20 / 25 __________ is the application of computer investigation in the interest of determining potential legan evidence:- Ecommerce Computer Forensics Both a, b None of them 21 / 25 Prevention of unauthorised used of resources refers to:- access control data integrity data confidentiality 22 / 25 A ________ attack attempts modification of data stream :- Passive Active Both a, b 23 / 25 Cyber security provides security against cyber terrorist:- No Yes 24 / 25 Packet filtering firewalls are also called _______________ generation firewalls:- third second first fourth 25 / 25 In IDS/IPS, signature is used to authenticate the identity of a user on the network:- False True Your score is Restart quiz