Request edit access
JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Quiz on Cyber Security
* Indicates required question
Student Full Name
*
Your answer
Class and Branch (eg.BE IT)
*
Your answer
1. _________ framework made cracking of vulnerabilities easy like point and click.
*
2 points
a) .Net
b) Metasploit
c) Zeus
d) Ettercap
2. From the options below, which of them is not a threat to information security?
*
2 points
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged default password
Option 1
Clear selection
3. Which of the following information security technology is used for avoiding browser-based hacking?
*
2 points
a) Anti-malware in browsers
b) Remote browser access
c) Adware remover in browsers
d) Incognito mode in a browser
4. Compromising confidential information comes under _________
*
2 points
a) Bug
b) Threat
c) Vulnerability
d) Attack
5.Lack of access control policy is a _____________
*
2 points
a) Bug
b) Threat
c) Vulnerability
d) Attack
6. Possible threat to any information cannot be ________________
*
2 points
a) reduced
b) transferred
c) protected
d) ignored
7.The full form of Malware is ________
*
2 points
a) Malfunctioned Software
b) Multipurpose Software
c) Malicious Software
d) Malfunctioning of Security
8. _____________ is a code injecting method used for attacking the database of a system / website.
*
2 points
a) HTML injection
b) SQL Injection
c) Malicious code injection
d) XML Injection
9.Which of them is not a wireless attack?
*
2 points
a) Eavesdropping
b) MAC Spoofing
c) Wireless Hijacking
d) Phishing
10._________ are the special type of programs used for recording and tracking user’s keystroke.
*
2 points
a) Keylogger
b) Trojans
c) Virus
d) Worms
Submit
Clear form
Never submit passwords through Google Forms.
This form was created inside of SNJB (Jain Gurukul).
Does this form look suspicious?
Report
Forms