BS Cyber Security BE Cyber Security Quiz 57 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) in Cyber Security Quiz BS (Hon) Cyber Security Quiz 1 / 25 An act of protecting information from unauthorised disclosure to an entity :- Integrity Confidentiality availability 2 / 25 Which term is not  a valid terminology  and type of adware :- Mobile adware Smart home adware Mac adware 3 / 25 Which is defines as an attempt to steal, spy , damage computer system of their associated information;- Cryptography Cyber attack Computer security 4 / 25 Automated spamming tools subscribe to mail list in order to complete_____________ task:- Both a, b deny services to mail list recipient collect email addresses 5 / 25 Encryption system is symmetric  key encryption algorithm :- True False 6 / 25 Which describe an ongoing pursuit  by an individual :- Phishing Identity theft Stalking 7 / 25 For discovering the OS running on the target system , the scanning  has a specific  term. what is it :- Footprinting 3D printing Fingerprinting 8 / 25 Which is not a  network scanner ;- Netcat Qualys NMAP 9 / 25 Which is not an example  of a passive  online attack ;- Reply attack MiTM Phishing 10 / 25 n a word press site , which is the default service to prevent spammers from posting comments:- Website inspector Mailwasher pro Akismet 11 / 25 Which is not a threat of a web application :- Cookie snooping Session poisoning Phishing 12 / 25 User might invite some bogus virus in his  system by clicking the :- Shareware Spyware Adware 13 / 25 BBproxy tool is used in which mobile OS :- blackberry Android Symbian 14 / 25 Find out, select and Uninstall all __________ programs from your computer ;- Unwanted Pre installed Useful 15 / 25 __________ action can be taken while filtering pop3 spam traffic:- Redirect it to the spam mail box Return it to the sender Delete the spam mail 16 / 25 Network Stumbler is a windows Wi-Fi monitoring tool :- True False 17 / 25 AES stands for ;- None of them Advanced Encryption Standard Advanced Encryption Security 18 / 25 DNS poisoning is a very dangerous  because it can  extend  its reach from one _______ to another ;- ISP server Linux server DNS server 19 / 25 _______________ are used which crawls  web pages looking for email  ids and copies them to the database ;- Spiders Cookies Caches 20 / 25 Which protocol is not susceptible to sniffing :- FTP NNTP UDP 21 / 25 Download copy , extract data from an open system done fraudulently  is treated as :- Data backup Cyber warfarev Cyber crime 22 / 25 BIOS is abbreviated as ;- Basic internet output system Basic Input output service Basic Input Output system 23 / 25 Conversion of cypher text to plain text:- simple text decryption Encryption 24 / 25 What is full form of DDoS:- Distributed Denial of service Derived Denial of service Denial of service 25 / 25 Brute force attack is :- Inefficient Slow Fast Your score is Restart quiz