1.
In Cyber Security, which of the following registry entries have to be altered to block the USB access?
2.
In Cyber Security, which of the following Nmap commands is used to bypass a firewall while scanning for open TCP ports?
3.
In Cyber Security, the buffer overflow is a ___________________________ attack.
4.
In Cyber Security, which of the following attacking vectors is used to perform the DDoS attack?
5.
In Cyber Security, which of the following is used to perform an ACK scan on an open port?
6.
In Cyber Security, which of the following statements defines SYN flood attack?
7.
In Cyber Security, which of the following libraries is used to capture packets on Windows platform?
8.
In Cyber Security, which of the following tools is not used to suspect a malware in a network?
9.
In Cyber Security, which of the following commands is used to list all the live hosts in a subnet?
10.
In Cyber Security, which of the following is used to detect the bypassing of the host if the internet access is prohibited on the premises?