BS Cyber Security BE Cyber Security Quiz 45 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) in Cyber Security Quiz BS (Hon) Cyber Security Quiz 1 / 25 Which tool is used for Blackjacking :- BBproxy Blackburried BBAtracker 2 / 25 Personal computers and networks are often a valuable source of evidence . Those involved with ___________ should be comfortable with this technology:- Criminal investigation Defense work Prosecution All of them 3 / 25 In the SSL protocol , each upper layer message if fragmented into a maximum of ______________ bytes;- 232 216 214 4 / 25 A full domain name is sequenced of lables separated by ____________:- colons Semicolons dots 5 / 25 Cyber crime can be categorized into __________ types :- 2 4 3 6 / 25 ____________ cryptography operates on binary bit series and string :- Modern Traditional Classic 7 / 25 Cyber crime can be categorized into _______________ types:- 2 3 4 8 / 25 There are _---------- types of cognitive hacking :- 6 5 3 9 / 25 The information Technology act, 2000 was amended in the year ;- 2008 2013 2012 10 / 25 There are ____________ types of DoS attack ;- 4 2 3 11 / 25 ____________ is one of the most widely used web server platform :- IAS IIS ISS 12 / 25 Repeated act of harassment after threatening behaviour is called as :- Data Diddling Cyber theft Cyber stalking 13 / 25 XSS stands for:- Crack Server Scripting Crack Site Scripting Cross Site Scripting 14 / 25 The enactment of IT act affected the provision in ;- Dowry prohibition act Transfer of Property act Indian evidence act 15 / 25 Application layer DoS attack is also known as :- Layer 7 DoS attack Layer 4 DoS attack Layer 5 DoS attack 16 / 25 A digital signature needs_______________ system:- Symmetric key asymmetric key either a, b 17 / 25 Which is not the primary objective of cryptography : Data Redundancy Confidentiality Non Repudiation 18 / 25 _____________ is also known as cavity virus :- Non resident virus Space filler virus Overwrite virus 19 / 25 Which is the hashing algorithm:- 3-DES AES MD5 DES 20 / 25 Prevention of unauthorized used of resources refers to:- access control data confidentiality data integrity 21 / 25 The ___________ model is 7 layer architecture where each layer is having some specific functionality to perform:- osi tcp ois 22 / 25 In IDS/IPS, signature is used to authenticate the identity of a user on the network:- False True 23 / 25 ___________ means knowledge obtained from investigation , study, intelligence new facts:- Security data information 24 / 25 Section 66 A is striked down by the judiciary in the case of Shreya Singhal vs U.O.I:- False True 25 / 25 A __________ takes executable file as input and tries to generate high level code :- Debugger Decompiler Disassembler Your score is Restart quiz