This is a computer science engineering quiz on cyber security, which includes the basics of cyber security, the importance of cyber security, how we can use cyber security to protect our system and data from cyber-attacks.
The full form of Malware is ________
Who deploy Malwares to a system or network?
_____________ is a code injecting method used for attacking the database of a system / website.
XSS is abbreviated as __________
This attack can be deployed by infusing a malicious code in a website’s comment section. What is “this” attack referred to here?
When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.
Compromising a user’s session for exploiting the user’s data and do malicious activities or misuse user’s credentials is called ___________
Which of this is an example of physical hacking?
Which of them is not a wireless attack?
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
Which method of hacking will record all your keystrokes?
_________ are the special type of programs used for recording and tracking user’s keystroke.
These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.
Stuxnet is a _________
___________ is a violent act done using the Internet, which either threatens any technology user or leads to loss of life or otherwise harms anyone in order to accomplish political gain.