Question 1
Palm scan, Fingerprint and Iris scan are forms of
Question 2
which is a common type of cyber attack?
Question 3
__________ is proving that a user is the person he or she claims to.
Question 4
The initial phase of ethical hacking is____________.
Question 5
What is the primary purpose of a firewall in cyber security?
Question 6
The code "red" signifies_________.
Question 7
Fine the features which violate cyber security.
Question 8
Which of the following suite is used for NTP enumeration
Question 9
PCT stand for ____________.
Question 10
In system hacking, which of the following is the most crucial event?
Question 11
Identify the least strong security encryption.
Question 12
Which of the following is an example of a malware type?
Question 13
Which of the below dose not constitute a cybercrime?
Question 14
What is the function of an antivirus software?
Question 15
Identify the legal form of hacking.