Helloloksewa

My Loksewa Preparation

Select Your Favourite
Category And Start Learning.

cyber security exam set

Welcome to your Cyber security Exam set

1. 
What is the full form of CIA under information security?

2. 
What is called periodic assessment of security vulnerability in computer system?

3. 
Which method go through all the files or network elements with an intention to detect something unusual?

4. 
Victims of cyber attack might loose _______.

5. 
Attacking the victims through fake URL resembling that of a valid financial Institution is called_____ .

6. 
Potential weaknesses in IT infrastructure through which a cyber attack might occur is called __.

7. 
Vulnerability for cyber attack may be in______.

8. 
To protect the network infrastructure from vulnerability, _____ is setup.

9. 
The person using vulnerability in operating system or application software or IT infrastructure to intrude in to the computer of a victim is called ______ .

10. 
Keyloggers(Keyloggers are a type of monitoring software designed to record keystrokes made by a user.) are a form of _______.

11. 
Which of these is an antivirus program type?

12. 
Which of these is also malicious software?

13. 
Using the cipher algorithm, which of these types of text would be transformed?

14. 
________ is a form of virus explicitly designed to avoid detection by antivirus software.

15. 
Which one of the following can be considered as the class of computer threats?

16. 
Which of the following is considered as the unsolicited commercial email?

17. 
Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?

18. 
_______ is a type of software designed to help the user's computer detect viruses and avoid them.

19. 
Which of the following refers to stealing one's idea or invention of others and use it for their own benefits?

20. 
Hackers usually used the computer virus for ______ purpose.

21. 
In the computer networks, the encryption techniques are primarily used for improving the ________

22. 
Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system?

23. 
Hackers usually used the computer virus for ______ purpose.

24. 
Which of the following statements is correct about the firewall?

25. 
Which of the following statements is true about the Trojans?

Comment List

Leave a comment

Your email address will not be published.