Cyber security (OE)

Cyber security (OE)

Assessment

Assessment

Created by

Vijayakumar Rajarathinam

Instructional Technology

University

1 plays

Hard

10 questions

Show all answers

1.

MULTIPLE CHOICE

30 sec • 1 pt

Forged source address is also called as ____________.

2.

MULTIPLE CHOICE

30 sec • 1 pt

The attacker uses malware to subvert the system and install an attack agent which they can control. Such systems are known as

3.

MULTIPLE CHOICE

30 sec • 1 pt

Which One of them is Passive attack?

4.

MULTIPLE CHOICE

30 sec • 1 pt

SSL primarily focuses on _______ .

5.

MULTIPLE CHOICE

30 sec • 1 pt

To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.

6.

MULTIPLE CHOICE

30 sec • 1 pt

A proxy firewall filers at

7.

MULTIPLE CHOICE

30 sec • 1 pt

The protection against Denial by one of these parties in a communication refers to?

8.

MULTIPLE CHOICE

30 sec • 1 pt

In what ways the system could be attacked by DoS?

9.

MULTIPLE CHOICE

30 sec • 1 pt

Firewalls can be of these kinds.

10.

MULTIPLE CHOICE

30 sec • 1 pt

It take a variety of forms, based on which network protocol is being used to implement the attack

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?