BS Cyber Security BE Cyber Security Quiz 138 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) in Cyber Security Quiz BS (Hon) Cyber Security Quiz 1 / 25 The domain name space is divided into -_______ different sections:- 4 3 2 2 / 25 Which is an example of Botnet :- Zeus ILOVE YOU My Doom 3 / 25 PGP make use of which cryptographic algorithm:- rsa des aes 4 / 25 To protect the computer system against the hacker and different kind of viruses , one must always keep ____________ on in the computer system:- Vic player Firewall Antivirus 5 / 25 _________ is the central node of 802.11 wireless operations :- Access point WPA WAP 6 / 25 Session Hijacking takes place at ___________ number of levels :- 2 5 4 7 / 25 ________ deletes all the files that it infects :- Polymorphic virus Non resident virus Overwrite virus 8 / 25 Cyber security provides security against cyber terrorist:- No Yes 9 / 25 Active _________ when you are required it to use , otherwise turn it off for security purposes ;- Flash light Bluetooth App update 10 / 25 __________ is considered as unsolicited commercial email:- Malware All of them Virus Spam 11 / 25 Which is not a type of cyber crime :- Forgery Installing antivirus for protection Data theft 12 / 25 Direct action virus is also known as :- Boot sector virus Non resident virus Polymorphic virus 13 / 25 In cryptography ,the order of the letter in a message is rearranged by _____________:- Both a, b transpositional ciphers substitution ciphers None 14 / 25 Which attack based check webinspect can not do ;- Injecting shell code Cross site scripting Directory traversal 15 / 25 When plain text is converted to unreadable format , it is termed as ;- Cipher text Raw text Rotten text 16 / 25 Which is not a private search engine :- Baidu Start page Qwant 17 / 25 __________ tracks your data and displays those products as ads for promotions :- System monitors Spy Trojans Ad based spyware 18 / 25 Which is not a vulnerability of the network layer ;- IP address spoofing Weak or non existent authentication Route spoofing 19 / 25 In asymmetric key cryptography , the private key is kept by:- both a, b receiver sender 20 / 25 Sending offensive message to someone comes under ________________ IT Act:- section 66-a 2000 section 66 a-2008 section 66 b-2008 21 / 25 Which factors of the network gets hugely impacted when the number of users exceeds the network's limit:- Reliability Longevity Performance 22 / 25 Which is not a vulnerability scanning tool :- None of them Snort Nexpose 23 / 25 Which one of them is a passive attack:- Replay previous message obtain message contains denial of service Modify message in transit 24 / 25 An act of protecting information from unauthorised disclosure to an entity :- Confidentiality Avalability Integrity 25 / 25 A computer ___________ is a malicious code which self replicate :- Program Virus Application Your score is Restart quiz