1.
2.
3.
4.
Q:2. Identify the software whose vulnerability is exploited the most?
1.
2.
3.
4.
Q:3. The computer vulnerabilities and exploits databases are maintained by _________.
1.
2.
3.
4.
Watch The video for css quiz 2 soluiton
Q:4. Which of the following is/are correct with respect to Ransomware?
1.
2.
3.
4.
Q:5. What hacking attacks were mentioned in the lesson?
1.
2.
3.
4.
Q:6. Which of the following is not an advantage of studying Cyber Security?
1.
2.
3.
4.
Q:7. Which of the following is considered legal?
1.
2.
3.
4.
Q:8. What is the cost of launching Denial of Service attack on a website?
1.
2.
3.
4.
Q:9. Which of the following is correct for silent banker?
1.
2.
3.
4.
Q:10. Which of the following is not a part of Security System Centric Design?
1.
2.
3.
4.
Q:11. Which of the following is not a goal in the security system design?
1.
2.
3.
4.
Q:12. Which of the following is most important in design of secure system?
1.
2.
3.
4.
Q:13. Which of the following is correct with respect to Penetration testing?
1.
2.
3.
4.
Watch The Video for Css quiz 2 solution
Q:14. Which of the following is to be done to avoid limitations in threat models?
1.
2.
3.
4.
3 Comments
Never
ReplyDeleteRision kaha h
ReplyDeletesorry ism ereason bhul gaya tha likhna
Delete