IS4 PM_2025 – Telegram
IS4 PM_2025
736 subscribers
724 photos
47 videos
1.15K files
308 links
Download Telegram
Keyloggers are form of
Anonymous Quiz
76%
Spyware
18%
Malware
6%
WW ||
0%
WW |||
Which of the following comes under network layers DOS flooding
Anonymous Quiz
3%
UDP flooding
18%
HTTP flooding
60%
SYN flooding
19%
All of above
Is used to discover the Mac address
Anonymous Quiz
76%
ARP
5%
Ping
13%
DNS
6%
ICMP
In most cases integrity is enforced through Confidentiality
Anonymous Quiz
61%
True
39%
False
Viruses that are triggered by the passage of time or on a certain date
Anonymous Quiz
26%
Time Bob
3%
K-BOB
8%
Suga
63%
Time bombs
🤣6
In most cases integrity is enforced through
Anonymous Quiz
48%
Physical security
10%
Logical security
12%
Confidentiality
30%
Access control
👍1
After an attacker has probed a network for information the next step is to
Anonymous Quiz
68%
Penetrate any defense
17%
Circumstances are required
11%
He is wonderful
5%
None
👍1
In which category does compromising confidential information fall?
Anonymous Quiz
50%
Threat
13%
Bug
11%
Russi is great
26%
Attack
Which software is mainly used to detect viruses and avoid them
Anonymous Quiz
5%
Antinal
9%
Anticipate
8%
Anthony
78%
Anti-virus
🤣2
A reply attack is to punch the attacker's face
Anonymous Quiz
30%
True
70%
False
A reply attack makes it awesome
Anonymous Quiz
42%
True
58%
False
👍1
A replay attack replays the attack until the server is dead
Anonymous Quiz
51%
True
49%
False
🤣4
Computer security is protection of the integrity availability and confidentiality of information system resources
Anonymous Quiz
94%
T
6%
F
Malicious software can be used to trick users into revealing sensitive personal data
Anonymous Quiz
89%
T
11%
F
Spyware is a general term used for describing software that gathers information without user's consent
Anonymous Quiz
88%
T
12%
F
The best hackers in the world are in Russia
Anonymous Quiz
72%
True
28%
False
phishing means diving in the sea
Anonymous Quiz
37%
True
63%
False
Conventional cryptography also known as asymmetric encryption ?
Anonymous Quiz
56%
True
44%
False