1.
In Cyber Security, which of the following algorithms is used to guarantee whether the private messages are in transit, being sent or stored?
2.
In Cyber Security, why is social engineering effective compared to all the other techniques?
3.
In Cyber Security, how will you secure your WiFi access point if someone is using your WiFi internet without your permission though you have applied WPA2-PSK TKIP security standard?
4.
_____________ is a type of threat in the Cyber Security where the DNS Server accepts and uses wrong information from a host that does not have the permission to use this information.
5.
In Cyber Security, which of the following modes in Wireshark is used to capture traffic from public WiFi hotspot?
6.
In Cyber Security, which of the following modules is not used by Metasploit for exploitation?
7.
In Cyber Security, which of the following will you use if you are facing a DDoS attack?
8.
In Cyber Security, where will you find the information about the browser which was used by the remote IP to attack the web server in a webserver’s log and headers?
9.
In Cyber Security, which of these will you check while working on a Metasploit, if you get an error that the target system has not been selected and fails to run?
10.
In Cyber Security, which of the following commands is used to import nmap scan results in Metasploit?