BE Cyber Security Quiz

0

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) in Cyber Security Quiz

BS (Hon) Cyber Security Quiz

1 / 25

Which are direct harm caused by spam:-

2 / 25

For RSA to work , the value of P must be less than the value of:-

3 / 25

Data integrity compromised when and are taken control off:-

4 / 25

In this topology there is a central controller or hub:-

5 / 25

________ Keeps tab on every online activity the victim engage in , complies all the data in the background ,and send it to the third party:-

6 / 25

Physical or logical arrangement of network is:-

7 / 25

The CIA triad is often represented by ___________:-

8 / 25

Conversion of cypher text to plain text:-

9 / 25

In systematic scheme requires both parties to share how many secret key:-

10 / 25

DNS translates a DOMAIN name into:-

11 / 25

Which comes under the advantage of circuit level gateway firewalls;-

12 / 25

___________ observe each activity on the internet of the victim and send all information to someone  else:-

13 / 25

When you use the word ____________ it means you are protecting your data from getting disclose:-

14 / 25

A hacker suggested password to a program is called as:-

15 / 25

Which one is a cryptographic protocol used to secure HTTP connection:-

16 / 25

In asymmetric key  cryptography , the private key is kept by:-

17 / 25

An act of protecting information from unauthorised disclosure to an entity :-

18 / 25

A way to ensure that the entity is indeed what it claims to be:-

19 / 25

Who is founder of cyber security:-

20 / 25

WPA2 is used for security in;-

21 / 25

In asymmetric key cryptography , the two keys a and d have special relationship to:-

22 / 25

The __________ is the message after transformation:-

23 / 25

Which multiple access technique is used by IEEE 802.11 Standard for wireless LAN:-

24 / 25

______________ can also considered as the instances of Open Design:-

25 / 25

Which is known as the oldest phone hacking technique:-

Your score is