Computer Application Set-1

All Computer Application Quiz Sets

Question 1

Palm scan, Fingerprint and Iris scan are forms of

Question 2

which is a common type of cyber attack?

Question 3

__________ is proving that a user is the person he or she claims to.

Question 4

The initial phase of ethical hacking is____________.

Question 5

What is the primary purpose of a firewall in cyber security?

Question 6

The code "red" signifies_________.

Question 7

Fine the features which violate cyber security.

Question 8

Which of the following suite is used for NTP enumeration

Question 9

PCT stand for ____________.

Question 10

In system hacking, which of the following is the most crucial event?

Question 11

Identify the least strong security encryption.

Question 12

Which of the following is an example of a malware type?

Question 13

Which of the below dose not constitute a cybercrime?

Question 14

What is the function of an antivirus software?

Question 15

Identify the legal form of hacking.

Scroll to Top