BS Cyber Security

BE Cyber Security Quiz

43

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) in Cyber Security Quiz

BS (Hon) Cyber Security Quiz

1 / 25

Which is defines as an attempt to steal, spy , damage computer system of their associated information;-

2 / 25

Which  is  not  an example  of  a  botnet program :-

3 / 25

Domain   names are   simply  the  _____________ of  the internet :-

4 / 25

Automated spamming tools  subscribe to mail list in order to complete_____________ task:-

5 / 25

DNS translates a DOMAIN name into:-

6 / 25

_________ is used in Directory Harvest Attack:-

7 / 25

Where did the term ' hacker' originates;-

8 / 25

Sometimes  _________  anonymize  them  to perform  criminal  activities :-

9 / 25

___________ refers  to the  phishing  performed  over  smart phone  by  calling :-

10 / 25

Which  protocol  is  not  susceptible  to sniffing :-

11 / 25

Keeping  the   password  by  the name of  your  pet is  a  good  choice :-

12 / 25

Which protocol  is  not  susceptible  to sniffing :-

13 / 25

__________ is used to create the organisations's overall security program:-

14 / 25

Data  loss  prevention   focuses  on the  detection   and  prevention  of  sensitive  data   exfiltration and lost data :-

15 / 25

Investigation reconstruction is composed of ________________ different form:-

16 / 25

Protection against denial by one of these parties in a communication refers to:-

17 / 25

Determine the kind of symmetric key algorithm that encrypts data using a streaming cypher:-

18 / 25

________ uses the idea of certificate trust level:-

19 / 25

In _______________ a person is constantly followed  by another person :-

20 / 25

Which   attack  based  check  webinspect  can not  do ;-

21 / 25

Personal computers and networks are often a valuable source of evidence . Those involved with ___________ should be comfortable with this technology:-

22 / 25

Every appeal  to  cyber  appellate   Tribunal  shall be filed  within  a  period of ;-

23 / 25

In cryptography, cipher is an algorithm to performing encryption and decryption:-

24 / 25

In any organization company or firm the policies of information security comes under _______________:-

25 / 25

Salami attacks  are used  for the  commission of :-

Your score is