1.
Which of the following can be considered as the elements of cyber security?
2.
Code Red is a type of ________
3.
To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.
4.
Which one of the following is actually considered as the first computer virus?
5.
Which of the following are the types of scanning?
6.
In system hacking, which of the following is the most crucial activity?
7.
Which of the following is not a type of scanning?
8.
In ethical hacking and cyber security, there are _______ types of scanning:
9.
Which of the following port and IP address scanner famous among the users?
10.
Which one of the following usually used in the process of Wi-Fi-hacking?