BE Cyber Security Quiz 0 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) in Cyber Security Quiz BS (Hon) Cyber Security Quiz 1 / 25 Which are direct harm caused by spam:- All of them Increased staff costs Increased infrastructure costs Loss of productivity 2 / 25 For RSA to work , the value of P must be less than the value of:- q n r p 3 / 25 Data integrity compromised when and are taken control off:- both a, b file permission access control 4 / 25 In this topology there is a central controller or hub:- Mesh Ring Star 5 / 25 ________ Keeps tab on every online activity the victim engage in , complies all the data in the background ,and send it to the third party:- Adware Spyware Malware 6 / 25 Physical or logical arrangement of network is:- Routing Topology Networking 7 / 25 The CIA triad is often represented by ___________:- triangle diagonal ellipse 8 / 25 Conversion of cypher text to plain text:- simple text decryption Encryption 9 / 25 In systematic scheme requires both parties to share how many secret key:- 3 4 2 1 10 / 25 DNS translates a DOMAIN name into:- Hex URL IP Binary 11 / 25 Which comes under the advantage of circuit level gateway firewalls;- they are expensive they are light weight they maintain anonymity and also inexpensive 12 / 25 ___________ observe each activity on the internet of the victim and send all information to someone else:- Spyware Adware Malware 13 / 25 When you use the word ____________ it means you are protecting your data from getting disclose:- Integrity Authentication Confidentiality 14 / 25 A hacker suggested password to a program is called as:- dictionary attack default password attack password guessing 15 / 25 Which one is a cryptographic protocol used to secure HTTP connection:- resource reservation protocol Stream control transmission protocol transport layer security 16 / 25 In asymmetric key cryptography , the private key is kept by:- sender receiver both a, b 17 / 25 An act of protecting information from unauthorised disclosure to an entity :- Confidentiality Avalability Integrity 18 / 25 A way to ensure that the entity is indeed what it claims to be:- Identification Authentication accountability 19 / 25 Who is founder of cyber security:- Vint cerf Bob Thomas 20 / 25 WPA2 is used for security in;- bluetooth ethernet wi-fi 21 / 25 In asymmetric key cryptography , the two keys a and d have special relationship to:- others keys each other data 22 / 25 The __________ is the message after transformation:- Cipher text Secret key Plain text 23 / 25 Which multiple access technique is used by IEEE 802.11 Standard for wireless LAN:- CSMA/CA CDMA ALOHA 24 / 25 ______________ can also considered as the instances of Open Design:- DVD player CSS Both a, b 25 / 25 Which is known as the oldest phone hacking technique:- Phishing Phreaking Cracking Your score is Restart quiz