Sahyog College of Management Studies                                    
                                                                             Online Examination
                                                                    Course: SY BCA Semester IV
                                                                                   (Class Test)

                                                             Network & Web Security(3IBCA404)

                                                               Time: 45 Minutes         Max Marks: 30                              
                                                               Date: 09/06/2021        Min Marks:  10
     
Instructions:
1. All the questions are compulsory
2. Each question carries 1 mark                                                

Email *
Student Name *
Class *
Required
Which of the following is considered as the unsolicited commercial email? *
_______ is a type of software designed to help the user's computer detect viruses and avoid them *
Which one of the following refers to the technique used for verifying the integrity of the message? *
In system hacking, which of the following is the most crucial activity? *
Which of the following can be considered as the elements of cyber security? *
To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system. *
Hackers usually used the computer virus for ______ purpose. *
In the computer networks, the encryption techniques are primarily used for improving the ________ *
Which type of the following malware does not replicate or clone them self's through infection? *
Which of the following malware's type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers. *
In the CIA Triad, which one of the following is not involved? *
In order to ensure the security of the data/ information, we need to ____________ the data: *
Why hackers use proxy server? *
Which type of symmetric key algorithm using a streaming cipher to encrypt information? *
Which of the following is not a typical characteristic of an ethical hacker? *
There are ........... types of scanning in ethical hacking and cyber-security *
In which year, the first computer worm (virus) created? *
Cybersecurity is the protection of ? *
Viruses are – *
The certificate Authority signs the digital certificate with *
Which of the following technique is used to verify the integrity of the message? *
Which of following is the first computer virus? *
Which of the following is most important in design of secure system? *
Which of the following is not the example of physical data leakage? *
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ *
 _________ are those individuals who maintain and handles IT security in any firm or organization. *
__________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. *
_____________ is a code injecting method used for attacking the database of a system / website. *
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________ *
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here? *
Submit
Clear form
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy