BS Cyber Security BE Cyber Security Quiz 100 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) in Cyber Security Quiz BS (Hon) Cyber Security Quiz 1 / 25 the full form of OSI in OSI model:- Open Software Interconnection Open connection Open System Interconnection 2 / 25 Using __________ for doing competitive information gathering is a crime :- Antivirus Adware Spyware 3 / 25 The ___________ model is 7 layer architecture where each layer is having some specific functionality to perform:- ois osi tcp 4 / 25 Which can be considered as the element of cyber security:- Application security Operational security All of them Network security 5 / 25 DNS translates a DOMAIN name into:- Binary URL Hex IP 6 / 25 Application level gateway firewalls protect the network for specific:- Application layer protocol session layer protocol botnet attacks 7 / 25 IT act 2000, amended in :- 2008 2011 2005 8 / 25 The domain name space is divided into -_______ different sections:- 2 3 4 9 / 25 The procedure to add bits to the last block is termed as----------;- decryption tunning hashing padding 10 / 25 Which is not an anti spamming tool :- Anti spyware Tech Spam Eater Pro Spam Expert Desktop 11 / 25 Public key cryptography is also called as:- Both a, b Symmetric key cryptography asymmetric key cryptography 12 / 25 Information technology act in based on model set of laws provided by - UNTCAD UNO UNCITRAL 13 / 25 ____________ provides an isolated tunnel across a public network for sending and receiving data privately:- Virtual Private network Virtual protocol,network Visual Private network 14 / 25 An attempt to harm, damage to a system or network is broadly termed as:- cyber crime cyber attack system hijacking 15 / 25 Which of them is the type of cipher:- Both of them Stream cipher Black cipher 16 / 25 The __________ is original message before transformation;- Secret key Plaintext Ciphertext 17 / 25 Extensions to the X.509 certificates were added in version _______________:- 2 3 4 1 18 / 25 ___________ scanning is a procedure to identify active hosts on your network :- Port System Network 19 / 25 Strangers can not cause much trouble if we connect to them over social media :- True False 20 / 25 ___________ is the opposite of assembler ;- Compiler Reassembler Disassembler 21 / 25 ________ scans TCP ports and resolves different hostnames ;- SuperScan Snort EtterCap 22 / 25 An act of protecting information from unauthorised disclosure to an entity :- availability Confidentiality Integrity 23 / 25 The ___________ documentation specifies who handled the evidence , when where, and for what purpose:- Evidence inventory Evidence intake Chain of custody 24 / 25 when was the first computer was created;- 1970 1972 1971 25 / 25 Packet filtering firewalls are also called _______________ generation firewalls:- first third fourth second Your score is Restart quiz