BS Cyber Security

BE Cyber Security Quiz

45

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) in Cyber Security Quiz

BS (Hon) Cyber Security Quiz

1 / 25

Which  tool  is used  for  Blackjacking :-

2 / 25

Personal computers and networks are often a valuable source of evidence . Those involved with ___________ should be comfortable with this technology:-

3 / 25

In the SSL protocol , each upper layer message if fragmented into a maximum of ______________ bytes;-

4 / 25

A full domain name is sequenced  of lables separated by ____________:-

5 / 25

Cyber crime  can be  categorized  into  __________ types :-

6 / 25

____________ cryptography  operates   on binary  bit  series   and  string :-

7 / 25

Cyber  crime  can be  categorized  into _______________ types:-

8 / 25

There are _---------- types  of  cognitive  hacking :-

9 / 25

The  information  Technology act, 2000  was amended in the year ;-

10 / 25

There  are  ____________ types  of   DoS  attack ;-

11 / 25

____________ is  one  of the most  widely  used  web  server platform :-

12 / 25

Repeated  act of  harassment   after  threatening  behaviour  is  called as :-

13 / 25

XSS  stands  for:-

14 / 25

The enactment  of IT act  affected  the  provision in ;-

15 / 25

Application layer  DoS   attack is  also  known as :-

16 / 25

A digital signature needs_______________ system:-

17 / 25

Which is  not the  primary   objective   of  cryptography :

18 / 25

_____________ is  also  known as  cavity  virus :-

19 / 25

Which is the hashing algorithm:-

20 / 25

Prevention of unauthorized used of resources refers to:-

21 / 25

The ___________ model is 7 layer architecture where each layer is having some specific functionality to perform:-

22 / 25

In IDS/IPS, signature is used to authenticate the identity of  a user on the network:-

23 / 25

___________ means knowledge obtained from investigation , study, intelligence new facts:-

24 / 25

Section  66 A  is  striked  down  by   the judiciary  in the case of  Shreya  Singhal  vs  U.O.I:-

25 / 25

A  __________ takes   executable   file  as  input  and  tries  to  generate high  level  code :-

Your score is