
computer-system-security 1st-week-solution 2020
NOTE :- RED MARKS IS ANSWERS OF THIS QUESTIONS
computer-system-security 1st-week-solution 2020 ( css )1.
2.
3.
4.
Q:2. Identify the software whose vulnerability is exploited the most?
1.
2.
3.
4.
Q:3. The computer vulnerabilities and exploits databases are maintained by _________.
1.
2.
3.
4.
Q:4. Which of the following is/are correct with respect to Ransomware?
1.
2.
3.
4.
Q:5. What hacking attacks were mentioned in the lesson?
1.
2.
3.
4.
Q:6. Which of the following is not an advantage of studying Cyber Security?
1.
2.
3.
4.
Q:7. Which of the following is considered legal?
1.
2.
3.
4.
Q:8. What is the cost of launching Denial of Service attack on a website?
1.
2.
3.
4.
Q:9. Which of the following is correct for silent banker?
1.
2.
3.
4.
Q:10. Which of the following is not a part of Security System Centric Design?
1.
2.
3.
4.
Q:11. Which of the following is not a goal in the security system design?
1.
2.
3.
4.
Q:12. Which of the following is most important in design of secure system?
1.
2.
3.
4.
Q:13. Which of the following is correct with respect to Penetration testing?
1.
2.
3.
4.
Q:14. Which of the following is to be done to avoid limitations in threat models?
1.
2.
3.
4.
0 Comments:
Post a Comment