All Computer Application Quiz Sets
📝
Computer Application Quiz
Set 2
📋15Questions
⏱10Minutes
⚡40sPer Question
- ✔ Read each question carefully
- ✔ Navigate freely with Next / Previous
- ✔ Timer starts when you click Start
- ✔ Submit before time runs out
Question 1 of 15
⏱ 10:00
Q1 / 15
Identify the least strong security encryption.
Q2 / 15
Choose the default port number
Q3 / 15
Fine the features which violate cyber security.
Q4 / 15
Identify the class of computer threats.
Q5 / 15
Identify the legal form of hacking.
Q6 / 15
What is a search engine?
Q7 / 15
Which of the following security protocols is not strong?
Q8 / 15
Who is the father of cyber security?
Q9 / 15
Which of the below dose not constitute a cybercrime?
Q10 / 15
Who coined the term "cyberspace "
Q11 / 15
The authenticity and security of data travelling over a network are ensured by
Q12 / 15
The initial phase of ethical hacking is____________.
Q13 / 15
In system hacking, which of the following is the most crucial event?
Q14 / 15
Palm scan, Fingerprint and Iris scan are forms of
Q15 / 15
Full form of DNS
0
/15
Quiz Complete!
✅0Correct
❌0Wrong
⏭0Skipped
🎯 Try another set:
All Computer Application Quiz Sets