Question 1
The initial phase of ethical hacking is____________.
Question 2
What is cyber security?
Question 3
PCT stand for ____________.
Question 4
Full form of DNS
Question 5
Which of the following is an example of a malware type?
Question 6
which is a common type of cyber attack?
Question 7
The code "red" signifies_________.
Question 8
Which of the following suite is used for NTP enumeration
Question 9
The authenticity and security of data travelling over a network are ensured by
Question 10
When information is modified in unexpected ways, known as
Question 11
Choose the default port number
Question 12
Which Protocol is mostly used in Wi-Fi security?
Question 13
__________ is proving that a user is the person he or she claims to.
Question 14
Which of the below dose not constitute a cybercrime?
Question 15
The most common way to maintain data availability-