computer-system-security 1st-week-solution 2020 (css) | studytech

Technology

3/Technology/post-list

computer-system-security 1st-week-solution 2020 (css)

 


computer-system-security 1st-week-solution 2020

 NOTE :- RED MARKS  IS ANSWERS  OF  THIS QUESTIONS

computer-system-security 1st-week-solution 2020 ( css )

Q:1.
 What was the percentage increase in Zero Day Vulnerabilities in the year 2015?
1.
2.
3.
4.

Q:2. Identify the software whose vulnerability is exploited the most?
1.
2.
3.
4.

Q:3. The computer vulnerabilities and exploits databases are maintained by _________.
1.
2.
3.
4.

Q:4. Which of the following is/are correct with respect to Ransomware?
1.
2.
3.
4.

Q:5. What hacking attacks were mentioned in the lesson?
1.
2.
3.
4.

Q:6. Which of the following is not an advantage of studying Cyber Security?
1.
2.
3.
4.

Q:7. Which of the following is considered legal?
1.
2.
3.
4.

Q:8. What is the cost of launching Denial of Service attack on a website?
1.
2.
3.
4.

Q:9. Which of the following is correct for silent banker?
1.
2.
3.
4.

Q:10. Which of the following is not a part of Security System Centric Design?
1.
2.
3.
4.

Q:11. Which of the following is not a goal in the security system design?
1.
2.
3.
4.

Q:12. Which of the following is most important in design of secure system?
1.
2.
3.
4.

Q:13. Which of the following is correct with respect to Penetration testing?
1.
2.
3.
4.

Q:14. Which of the following is to be done to avoid limitations in threat models?
1.
2.
3.
4.
SHARE

StudyTechMind

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

0 Comments:

Post a Comment