BS Cyber Security

BE Cyber Security Quiz

139

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) in Cyber Security Quiz

BS (Hon) Cyber Security Quiz

1 / 25

Misuse of digital signatures of fraudulent  purposes comes under ______________ of IT Act:-

2 / 25

________ is  a  web application   assessment  security  tool :-

3 / 25

De compilation is  not  done  for  targeting  users   with  stealing  code :-

4 / 25

ISAKMP stands for:-

5 / 25

________ is used to entangle spammers:-

6 / 25

In cyber security there are _____________ types of scanning:-

7 / 25

There  are  ____________ type  of  exploit :-

8 / 25

Which is  not  a  web server  attack  type-

9 / 25

What  is  updated   version of the IT Act   2000:-

10 / 25

Session  Hijacking   takes  place  at  ___________ number  of  levels :-

11 / 25

Which is  a session  Hijacking tool :-

12 / 25

Which is a stuxnet:-

13 / 25

Which technique would be effective in helping to prevent phishing attack by scammer:-

14 / 25

Which event is not possible in wireless LAN:-

15 / 25

Malicious  adware  may sneak  into  your   system  by  ___________ different   ways ;-

16 / 25

In tunnel mode, IPSec protect the ____________:-

17 / 25

In symmetric schemes requires both parties to share how many secret keys:-

18 / 25

SSL provides:-

19 / 25

___________ means knowledge obtained from investigation , study, intelligence new facts:-

20 / 25

Machine learning benefits IDSec/IPSec by searching for similar patterns to know attacks;-

21 / 25

Firewall is a type of___________:-

22 / 25

Conventional   cryptography  is  also known as   _______________  or symmetric  key  encryption;-

23 / 25

Trojans   can not  self  replicate :-

24 / 25

In term of web security Threats, ' Impersonation of another use' is a passive attack:-

25 / 25

________ functions creates a message digest out of a message:-

Your score is