BS Cyber Security

BE Cyber Security Quiz

138

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) in Cyber Security Quiz

BS (Hon) Cyber Security Quiz

1 / 25

The domain name space is divided into -_______ different sections:-

2 / 25

Which is  an  example  of  Botnet :-

3 / 25

PGP make use of which cryptographic algorithm:-

4 / 25

To protect the computer system against the hacker and different kind of viruses , one must always keep ____________ on in the computer system:-

5 / 25

_________ is  the central node  of  802.11  wireless   operations :-

6 / 25

Session  Hijacking   takes  place  at  ___________ number  of  levels :-

7 / 25

________ deletes  all the  files  that it  infects :-

8 / 25

Cyber security provides security against cyber terrorist:-

9 / 25

Active  _________ when you  are  required  it  to use ,  otherwise  turn it off  for  security  purposes ;-

10 / 25

__________ is considered as unsolicited commercial email:-

11 / 25

Which is  not  a  type   of cyber  crime :-

12 / 25

Direct action virus  is  also  known as :-

13 / 25

In cryptography ,the order of the letter in a message  is rearranged by _____________:-

14 / 25

Which   attack  based  check  webinspect  can not  do ;-

15 / 25

When  plain text   is  converted   to  unreadable   format ,  it is termed as ;-

16 / 25

Which is  not  a   private  search engine :-

17 / 25

__________ tracks   your  data   and  displays  those  products  as ads  for promotions :-

18 / 25

Which  is  not a  vulnerability  of  the network layer ;-

19 / 25

In asymmetric key  cryptography , the private key is kept by:-

20 / 25

Sending offensive message to someone comes under ________________ IT Act:-

21 / 25

Which factors of the network gets hugely impacted when the number of users exceeds the network's limit:-

22 / 25

Which  is  not  a  vulnerability  scanning   tool :-

23 / 25

Which one of them is a passive attack:-

24 / 25

An act of protecting information from unauthorised disclosure to an entity :-

25 / 25

A  computer  ___________ is a  malicious  code which  self  replicate  :-

Your score is