Computer Application Set-2

All Computer Application Quiz Sets

Question 1

The initial phase of ethical hacking is____________.

Question 2

What is cyber security?

Question 3

PCT stand for ____________.

Question 4

Full form of DNS

Question 5

Which of the following is an example of a malware type?

Question 6

which is a common type of cyber attack?

Question 7

The code "red" signifies_________.

Question 8

Which of the following suite is used for NTP enumeration

Question 9

The authenticity and security of data travelling over a network are ensured by

Question 10

When information is modified in unexpected ways, known as

Question 11

Choose the default port number

Question 12

Which Protocol is mostly used in Wi-Fi security?

Question 13

__________ is proving that a user is the person he or she claims to.

Question 14

Which of the below dose not constitute a cybercrime?

Question 15

The most common way to maintain data availability-

Scroll to Top