computer-system-security 1st-week-solution 2020


computer-system-security 1st-week-solution 2020

 NOTE :- RED MARKS  IS ANSWERS  OF  THIS QUESTIONS



Q:1.
 What was the percentage increase in Zero Day Vulnerabilities in the year 2015?
1.
2.
3.
4.

Q:2. Identify the software whose vulnerability is exploited the most?
1.
2.
3.
4.

Q:3. The computer vulnerabilities and exploits databases are maintained by _________.
1.
2.
3.
4.


Watch The video for css quiz 2 soluiton 






Q:4. Which of the following is/are correct with respect to Ransomware?
1.
2.
3.
4.

Q:5. What hacking attacks were mentioned in the lesson?
1.
2.
3.
4.

Q:6. Which of the following is not an advantage of studying Cyber Security?
1.
2.
3.
4.

Q:7. Which of the following is considered legal?
1.
2.
3.
4.

Q:8. What is the cost of launching Denial of Service attack on a website?
1.
2.
3.
4.

Q:9. Which of the following is correct for silent banker?
1.
2.
3.
4.

Q:10. Which of the following is not a part of Security System Centric Design?
1.
2.
3.
4.

Q:11. Which of the following is not a goal in the security system design?
1.
2.
3.
4.

Q:12. Which of the following is most important in design of secure system?
1.
2.
3.
4.

Q:13. Which of the following is correct with respect to Penetration testing?
1.
2.
3.
4.

Watch The Video for Css quiz 2 solution 






Q:14. Which of the following is to be done to avoid limitations in threat models?
1.
2.
3.
4.

Post a Comment

3 Comments