BE Cyber Security Quiz

0

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) in Cyber Security Quiz

BS (Hon) Cyber Security Quiz

1 / 25

Conversion of cypher text to plain text:-

2 / 25

False positive is an  alert that indicates nefarious activity on a system that , upon further inspection, turns out torepresent legitimate network traffic:-

3 / 25

Expand WAN:-

4 / 25

________________ usually observe each activity on the internet of the victim;-

5 / 25

_________ is not an example of spyware tool:-

6 / 25

In the________ mode, IPSec protect the whole IP packets, including the original IP header:-

7 / 25

Automated spamming tools  subscribe to mail list in order to complete_____________ task:-

8 / 25

It can be a soften program that filters all data packets coming through the internet:-

9 / 25

In cryptography the order of the letters in message is rearranged by;-

10 / 25

Macro virus depends on applications to propagate:-

11 / 25

Release of message content and traffic analysis are two types of ____________ attacks:-

12 / 25

___________ means knowledge obtained from investigation , study, intelligence new facts:-

13 / 25

An attempt to make a computer resources unavailable to its intended users is called:-

14 / 25

The term ' CHAP' stands for:-

15 / 25

Which one is not a higher -layer SSL protocol:-

16 / 25

Which is considered as the first hacker's conference :-

17 / 25

When integrity is lacking in a security system:-

18 / 25

Circuit level gateway firewalls are installed in ______________ layer of OSI model:-

19 / 25

Which is known as the oldest phone hacking technique:-

20 / 25

__________ is the application of computer investigation in the interest of determining potential legan evidence:-

21 / 25

Prevention of unauthorised used of resources refers to:-

22 / 25

A ________ attack attempts modification of data stream :-

23 / 25

Cyber security provides security against cyber terrorist:-

24 / 25

Packet filtering firewalls are also called _______________ generation firewalls:-

25 / 25

In IDS/IPS, signature is used to authenticate the identity of  a user on the network:-

Your score is