IS4 PM_2025 – Telegram
IS4 PM_2025
736 subscribers
724 photos
47 videos
1.15K files
308 links
Download Telegram
Phishing is a form of Spamming
Anonymous Quiz
79%
True
21%
False
Ensures that the individual is who they claim to be
Anonymous Quiz
73%
Authentication
7%
Accounting
10%
Access control
10%
Certification
Availability :- identify the term which denotes the violation of principal if the computer is no more accessible
Anonymous Quiz
43%
False
57%
True
Possible threat to information can be ignored
Anonymous Quiz
55%
True
45%
False
An independent malicious software that need not any host program
Anonymous Quiz
18%
Virus
6%
Dedan
70%
Worm
6%
Open Source Templates
Possible threat to any information cannot be
Anonymous Quiz
21%
Protected
9%
Reduced
9%
Transferred
61%
Ignored
Keyloggers are form of
Anonymous Quiz
76%
Spyware
18%
Malware
6%
WW ||
0%
WW |||
Which of the following comes under network layers DOS flooding
Anonymous Quiz
3%
UDP flooding
18%
HTTP flooding
60%
SYN flooding
19%
All of above
Is used to discover the Mac address
Anonymous Quiz
76%
ARP
5%
Ping
13%
DNS
6%
ICMP
In most cases integrity is enforced through Confidentiality
Anonymous Quiz
61%
True
39%
False
Viruses that are triggered by the passage of time or on a certain date
Anonymous Quiz
26%
Time Bob
3%
K-BOB
8%
Suga
63%
Time bombs
🤣6
In most cases integrity is enforced through
Anonymous Quiz
48%
Physical security
10%
Logical security
12%
Confidentiality
30%
Access control
👍1
After an attacker has probed a network for information the next step is to
Anonymous Quiz
68%
Penetrate any defense
17%
Circumstances are required
11%
He is wonderful
5%
None
👍1
In which category does compromising confidential information fall?
Anonymous Quiz
50%
Threat
13%
Bug
11%
Russi is great
26%
Attack
Which software is mainly used to detect viruses and avoid them
Anonymous Quiz
5%
Antinal
9%
Anticipate
8%
Anthony
78%
Anti-virus
🤣2
A reply attack is to punch the attacker's face
Anonymous Quiz
30%
True
70%
False
A reply attack makes it awesome
Anonymous Quiz
42%
True
58%
False
👍1
A replay attack replays the attack until the server is dead
Anonymous Quiz
51%
True
49%
False