0% found this document useful (0 votes)
26 views80 pages

Theory Paper

The document outlines a test for candidates in Digital Forensic & Cyber Security, scheduled for June 8, 2024, at the College of International Skills Development. It consists of 21 questions divided into two sections: 20 multiple-choice questions and one practical task, with specific instructions regarding mobile phone usage and rough work. Each question assesses knowledge on various cybersecurity topics, including attacks, firewalls, and security measures.

Uploaded by

xubair958
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views80 pages

Theory Paper

The document outlines a test for candidates in Digital Forensic & Cyber Security, scheduled for June 8, 2024, at the College of International Skills Development. It consists of 21 questions divided into two sections: 20 multiple-choice questions and one practical task, with specific instructions regarding mobile phone usage and rough work. Each question assesses knowledge on various cybersecurity topics, including attacks, firewalls, and security measures.

Uploaded by

xubair958
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 80

Roll no: 862311 Signatures

Name: Muhammad Zubair


Candidate Signature
CNIC: 5420250200205
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What do DOS and DDoS attacks primarily target?
(a) Network connectivity
(b) Physical servers
(c) Online databases
(d) Software vulnerabilities
2- What is the primary need for Next-Generation Firewalls (NGFW)?
(a) Analyzing hardware
(b) Improving network speed
(c) Enhancing security
(d) Increasing latency
3- CentOS is a Linux distribution that is based on which other distribution?
(a) Red Hat Enterprise Linux
(b) Fedora
(c) Ubuntu
(d) Debian
4- What does the term "enumerate" refer to in the context of SQL injection?
(a) Counting the columns
(b) Calculating database entries
(c) Sorting the database
(d) Enumerating the database
5- What is the role of a Web Application Firewall (WAF) like F5 ASM in
cybersecurity?
(a) Preventing malware
(b) Enhancing hardware
(c) Protecting web apps
(d) Network monitoring
6- What does AWS IAM primarily focus on?
(a) Analyzing hardware
(b) Monitoring internet usage
(c) Enforcing security policies
(d) Managing network devices
7- What is the main goal of a web application hacking methodology?
(a) Fixing hardware
(b) Gaining unauthorized access
(c) Ensuring software quality
(d) Testing software
8- What is the main purpose of using WebCruiser in relation to SQL injection?
(a) Enhancing user experience
(b) Hosting websites
(c) Testing software
(d) Analyzing network traffic
9- What is one of the primary objectives of cybersecurity professionals?
(a) Creating complex software applications
(b) Identifying new market opportunities
(c) Maximizing profits for the company
(d) Protecting digital assets and data
10- What does the term "SSID" stand for in wireless networking?
(a) Secure Standard Identification
(b) Secure Security Identity
(c) Service Set Identifier
(d) Super Simple Identity
11- What are some key features and functionalities of Cisco Web Security Appliance
(WSA)?
(a) Improving hardware
(b) Analyzing network traffic
(c) Enhancing security
(d) Blocking malicious data
12- What is the purpose of Network Address Translation (NAT) on ASA?
(a) Preventing network attacks
(b) Enhancing network speed
(c) Analyzing network data
(d) Hiding internal IPs
13- What is the primary goal of virtualization on ASA firewalls?
(a) Improving network speed
(b) Enhancing storage
(c) Isolating networks
(d) Virtualizing hardware
14- Which software is commonly used for creating virtual machines?
(a) Adobe Photoshop
(b) Microsoft Office
(c) Google Chrome
(d) VMware Workstation
15- What is the primary goal of DNS poisoning in network sniffing?
(a) Hiding network data
(b) Forging DNS responses
(c) Blocking network traffic
(d) Changing router settings
16- What is the goal of a cloud attack in a cloud computing environment?
(a) Gaining unauthorized access
(b) Enhancing cloud performance
(c) Improving network speed
(d) Testing software
17- What is the purpose of controlling sender and recipient domains in Cisco ESA?
(a) Analyzing network data
(b) Enhancing security
(c) Improving hardware
(d) Isolating networks
18- Which term refers to the practice of having multiple layers of security to
protect information?
(a) Information defense-in-depth
(b) Singular protection
(c) Single defense
(d) Isolated control
19- What type of tools are used for SQL injection attacks?
(a) Database management
(b) Exploitation
(c) Network monitoring
(d) Antivirus
20- What is session hijacking in the context of cybersecurity?
(a) Capturing network data
(b) Forging digital signatures
(c) Modifying user behavior
(d) Stealing passwords

__The End__
Roll no: 862312 Signatures
Name: Asad ullah
Candidate Signature
CNIC: 5440147681369
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What does the term "email security pipeline" refer to in the context of Cisco
ESA?
(a) Hardware processing
(b) Network encryption
(c) Data movement
(d) Email protection
2- What is the purpose of high availability features in ASA firewalls?
(a) Improving user experience
(b) Enhancing network security
(c) Reducing latency
(d) Increasing hardware speed
3- What does the term "enumerate" refer to in the context of SQL injection?
(a) Counting the columns
(b) Calculating database entries
(c) Sorting the database
(d) Enumerating the database
4- What do DOS and DDoS attacks primarily target?
(a) Network connectivity
(b) Physical servers
(c) Online databases
(d) Software vulnerabilities
5- What is the main need for a Web Application Firewall (WAF)?
(a) Increasing latency
(b) Blocking data leaks
(c) Improving network speed
(d) Enhancing security
6- What is a "phishing" attack?
(a) Trying to access a locked room
(b) Sending physical letters
(c) Attempting to deceive people into revealing sensitive information
(d) Physically damaging computer hardware
7- Wireshark is primarily used for what purpose?
(a) Network analysis
(b) Data encryption
(c) Game development
(d) Hardware testing
8- What is the main purpose of a web API hacking methodology?
(a) Developing web apps
(b) Analyzing network data
(c) Testing API security
(d) Enhancing user experience
9- Which AWS access method allows programmatic interactions with AWS services?
(a) Graphical User Interface
(b) Command Line Interface
(c) Software Development Kit
(d) Web Management Console
10- What is the main goal of installing a Cisco Email Security Appliance (ESA)?
(a) Isolating networks
(b) Enhancing hardware
(c) Analyzing network data
(d) Improving security
11- What is Nikto primarily used for in the context of cybersecurity?
(a) Database management
(b) Network scanning
(c) Data encryption
(d) Gaming
12- What is the primary goal of virtualization on ASA firewalls?
(a) Improving network speed
(b) Enhancing storage
(c) Isolating networks
(d) Virtualizing hardware
13- What is the main purpose of firewall access control?
(a) Restricting network access
(b) Enhancing hardware
(c) Analyzing network data
(d) Testing software
14- What is the main purpose of a transparent firewall?
(a) Filtering packets
(b) Blocking data
(c) Analyzing traffic
(d) Enhancing hardware
15- What is the main goal of intrusion detection and prevention (IPS)?
(a) Isolating networks
(b) Improving network speed
(c) Blocking malicious data
(d) Enhancing security
16- What is the main purpose of using WebCruiser in relation to SQL injection?
(a) Enhancing user experience
(b) Hosting websites
(c) Testing software
(d) Analyzing network traffic
17- Which term refers to the practice of having multiple layers of security to
protect information?
(a) Information defense-in-depth
(b) Singular protection
(c) Single defense
(d) Isolated control
18- What can effective cybersecurity prevent?
(a) Unauthorized access and data breaches
(b) Coffee spills
(c) Power outages
(d) Traffic congestion
19- What is the purpose of creating a free-tier account on AWS by students?
(a) Creating free software
(b) Preventing data leaks
(c) Hosting websites
(d) Learning AWS services
20- What does a security policy consist of?
(a) Hardware settings
(b) System configurations
(c) Network topologies
(d) Software interfaces

__The End__
Roll no: 862313 Signatures
Name: Muhaddisa Batool
Candidate Signature
CNIC: 5440043238314
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What are countermeasures used for in the context of DOS/DDoS attacks?
(a) Improving network security
(b) Increasing attack complexity
(c) Enhancing attack speed
(d) Mitigating attack impact
2- What is one type of session hijacking that involves intercepting network traffic?
(a) Physical assault
(b) Replay attack
(c) Social engineering
(d) Network intrusion
3- What is the role of MAC flooding in network sniffing?
(a) Enhancing performance
(b) Improving security
(c) Analyzing MAC addresses
(d) Overloading network
4- What is the main purpose of firewall access control?
(a) Restricting network access
(b) Enhancing hardware
(c) Analyzing network data
(d) Testing software
5- What is the main goal of filtering based on application visibility and control?
(a) Blocking applications
(b) Enhancing hardware
(c) Analyzing data traffic
(d) Testing software
6- What is VLAN configuration used for in networking?
(a) Analyzing hardware
(b) Creating backup copies
(c) Managing virtual machines
(d) Routing network traffic
7- What does enforcing acceptable usage control primarily involve?
(a) Increasing network speed
(b) Blocking data leaks
(c) Testing software
(d) Improving hardware
8- What are some examples of web application threats?
(a) SQL injection
(b) Sunshine
(c) Rain
(d) Snow
9- What is the primary purpose of filtering based on web URLs?
(a) Blocking malicious URLs
(b) Analyzing network data
(c) Enhancing network speed
(d) Isolating network URLs
10- What is the main goal of intrusion detection and prevention (IPS)?
(a) Isolating networks
(b) Improving network speed
(c) Blocking malicious data
(d) Enhancing security
11- What is the primary purpose of performing DNS enumeration during
information gathering in ethical hacking?
(a) To launch a Distributed Denial of Service (DDoS) attack
(b) To intercept email communications between the target and third parties
(c) To identify subdomains associated with the target domain
(d) To discover open ports on the target system
12- What is the purpose of file blocking in security policies?
(a) Increasing network speed
(b) Enhancing security
(c) Analyzing network data
(d) Improving hardware
13- What is the main goal of impersonation on social networking sites?
(a) Extract user's financial data
(b) Gain more followers
(c) Learn new coding skills
(d) Access user's account
14- What is the main benefit of ASA clustering?
(a) Grouping hardware
(b) Analyzing network data
(c) Enhancing security
(d) Protecting user data
15- What is the purpose of different deployment options for Cisco ESA?
(a) Testing software
(b) Enhancing network speed
(c) Improving network security
(d) Isolating networks
16- What are some components of Amazon Virtual Private Cloud (VPC)?
(a) Databases
(b) Websites
(c) Virtual networks
(d) Virtual firewalls
17- What does the term "Cisco ISE architecture" refer to?
(a) Network design
(b) Hardware topologies
(c) System configurations
(d) Software interfaces
18- What are some key features and functionalities of Cisco Email Security
Appliance (ESA)?
(a) Blocking malicious data
(b) Enhancing security
(c) Analyzing network traffic
(d) Improving hardware
19- What is a "phishing" attack?
(a) Trying to access a locked room
(b) Sending physical letters
(c) Attempting to deceive people into revealing sensitive information
(d) Physically damaging computer hardware
20- What is the primary purpose of security zones?
(a) Isolating networks
(b) Analyzing network data
(c) Increasing performance
(d) Enhancing hardware

__The End__
Roll no: 862314 Signatures
Name: Sabira(5440097868468)
Candidate Signature
CNIC: 5440097868468
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the main need for a Web Application Firewall (WAF)?
(a) Increasing latency
(b) Blocking data leaks
(c) Improving network speed
(d) Enhancing security
2- Which deployment model allows multiple organizations to share a single cloud
instance?
(a) Hybrid Cloud
(b) Community Cloud
(c) Private Cloud
(d) Public Cloud
3- What is the primary purpose of filtering based on web URLs?
(a) Blocking malicious URLs
(b) Analyzing network data
(c) Enhancing network speed
(d) Isolating network URLs
4- What is the primary goal of vulnerability assessment tools?
(a) Identifying and assessing weaknesses
(b) Blocking network traffic
(c) Exploiting discovered vulnerabilities
(d) Creating secure passwords
5- What is one of the primary objectives of cybersecurity professionals?
(a) Creating complex software applications
(b) Identifying new market opportunities
(c) Maximizing profits for the company
(d) Protecting digital assets and data
6- What is the main goal of installing and verifying Cisco WSA in different
deployment scenarios?
(a) Enhancing hardware
(b) Analyzing network data
(c) Isolating networks
(d) Improving security
7- What is the purpose of different deployment models for firewalls?
(a) Isolating networks
(b) Analyzing network data
(c) Enhancing hardware
(d) Improving network speed
8- What is the primary purpose of AWS Elastic Compute Cloud (EC2)?
(a) Managing virtual machines
(b) Enhancing data storage
(c) Hosting websites
(d) Creating container images
9- What is the purpose of scanning in cybersecurity?
(a) Gathering reconnaissance information
(b) Monitoring network traffic
(c) Copying sensitive data
(d) Retrieving emails
10- Which protocol can be used for both NetBIOS and SNMP enumeration?
(a) SMTP
(b) ICMP
(c) TCP/IP
(d) HTTPS
11- What is the purpose of a vulnerability assessment report?
(a) Showcase hardware
(b) Identify attackers
(c) Document findings
(d) Describe the weather
12- What are some key features and functionalities of Cisco Web Security Appliance
(WSA)?
(a) Improving hardware
(b) Analyzing network traffic
(c) Enhancing security
(d) Blocking malicious data
13- What are some components of Amazon Virtual Private Cloud (VPC)?
(a) Databases
(b) Websites
(c) Virtual networks
(d) Virtual firewalls
14- What is the main goal of a SQL injection attack?
(a) Enhancing database speed
(b) Gaining unauthorized access
(c) Analyzing network data
(d) Blocking data
15- What do DOS and DDoS attacks primarily target?
(a) Network connectivity
(b) Physical servers
(c) Online databases
(d) Software vulnerabilities
16- What is the main goal of launching a SQL injection attack?
(a) Enhancing hardware
(b) Gaining unauthorized access
(c) Testing software
(d) Analyzing network traffic
17- What is enumeration in the context of cybersecurity?
(a) Process of finding software vulnerabilities
(b) Process of listing user accounts
(c) Process of hardware configuration mapping
(d) Process of mapping network topology
18- What type of penetration test does not involve any prior knowledge of the
target system?
(a) White-box testing
(b) Grey-box testing
(c) Black-box testing
(d) Clear-box testing
19- What does the term "email security pipeline" refer to in the context of Cisco
ESA?
(a) Hardware processing
(b) Network encryption
(c) Data movement
(d) Email protection
20- What is the purpose of a web server attack methodology?
(a) Enhancing server performance
(b) Testing hardware security
(c) Analyzing network data
(d) Gaining unauthorized access

__The End__
Roll no: 862315 Signatures
Name: Sidra Ibrahim
Candidate Signature
CNIC: 5440163653182
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the primary purpose of monitoring and reporting in security policies?
(a) Increasing performance
(b) Analyzing network data
(c) Enhancing network speed
(d) Improving hardware
2- What is the primary goal of database hardening in AWS?
(a) Enhancing user experience
(b) Protecting data integrity
(c) Improving hardware
(d) Testing database security
3- What is the main goal of installing and verifying Cisco WSA in different
deployment scenarios?
(a) Enhancing hardware
(b) Analyzing network data
(c) Isolating networks
(d) Improving security
4- What does the term "sniffing" refer to in the context of networking?
(a) Scanning hardware
(b) Filtering email
(c) Deleting software
(d) Capturing network data
5- What is the purpose of a vulnerability assessment report?
(a) Showcase hardware
(b) Identify attackers
(c) Document findings
(d) Describe the weather
6- What does the term "Modular Policy Framework" refer to in ASA firewalls?
(a) Network architectures
(b) Hardware modules
(c) Software configurations
(d) System frameworks
7- What is the purpose of controlling sender and recipient domains in Cisco ESA?
(a) Analyzing network data
(b) Enhancing security
(c) Improving hardware
(d) Isolating networks
8- What does "footprinting" in cybersecurity refer to?
(a) Physical tracing
(b) Gathering network statistics
(c) Collecting digital fingerprints
(d) Unauthorized access
9- What is a vulnerability in the context of cybersecurity?
(a) A way to protect sensitive data
(b) A firewall rule
(c) A security measure
(d) A weakness in a system
10- What is the purpose of initial setup/bootstrapping for Huawei USG6000v
Firewall?
(a) Testing hardware
(b) Enhancing security
(c) Installing software
(d) Isolating networks
11- What does ASA stand for in the context of firewall technologies?
(a) Adaptive Security Appliance
(b) Advanced System Architecture
(c) Automated Security Appliance
(d) American Software Agency
12- What is the primary difference between webhooks and a web shell?
(a) Functionality
(b) Security
(c) Usage
(d) Speed
13- What is the purpose of file blocking in security policies?
(a) Increasing network speed
(b) Enhancing security
(c) Analyzing network data
(d) Improving hardware
14- What is the main goal of a SQL injection attack?
(a) Enhancing database speed
(b) Gaining unauthorized access
(c) Analyzing network data
(d) Blocking data
15- What is the primary purpose of configuring policies on Cisco WSA?
(a) Blocking malicious data
(b) Enhancing user experience
(c) Testing software
(d) Increasing network speed
16- What is the purpose of a wireless hacking methodology?
(a) Analyzing network data
(b) Enhancing network performance
(c) Gaining unauthorized access
(d) Testing hardware security
17- What does AWS IAM primarily focus on?
(a) Analyzing hardware
(b) Monitoring internet usage
(c) Enforcing security policies
(d) Managing network devices
18- What command is used to change the permissions of a file in Linux?
(a) chmod
(b) ls
(c) cp
(d) chown
19- What does "traffic flow" refer to in the context of firewalls?
(a) Data movement
(b) Blood circulation
(c) Network design
(d) Network security
20- What is a "blind" SQL injection attack?
(a) An attack involving blinking
(b) An attack targeting vision
(c) An attack performed blindly
(d) An attack without a motive

__The End__
Roll no: 862316 Signatures
Name: sakina batool
Candidate Signature
CNIC: 5440172580162
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- Which deployment model allows multiple organizations to share a single cloud
instance?
(a) Hybrid Cloud
(b) Community Cloud
(c) Private Cloud
(d) Public Cloud
2- Which software is commonly used for creating virtual machines?
(a) Adobe Photoshop
(b) Microsoft Office
(c) Google Chrome
(d) VMware Workstation
3- What is the main goal of a SYN flooding attack?
(a) Analyzing network data
(b) Blocking websites
(c) Enhancing server performance
(d) Disrupting network access
4- What is the purpose of a SQL injection methodology?
(a) Testing software
(b) Analyzing network data
(c) Detecting malware
(d) Enhancing database speed
5- What does the term "Kubernetes vulnerability" refer to?
(a) Data encryption
(b) Hardware performance
(c) Network security
(d) Software weaknesses
6- What does website defacement involve?
(a) Changing hardware
(b) Improving website layout
(c) Blocking network data
(d) Unauthorized modification
7- What is the primary purpose of monitoring and reporting in security policies?
(a) Increasing performance
(b) Analyzing network data
(c) Enhancing network speed
(d) Improving hardware
8- What does "traffic flow" refer to in the context of firewalls?
(a) Data movement
(b) Blood circulation
(c) Network design
(d) Network security
9- What is the purpose of using SQL injection to bypass website logins?
(a) Testing website speed
(b) Enhancing login security
(c) Gaining unauthorized access
(d) Increasing website traffic
10- What does "network level hijacking" involve in cybersecurity?
(a) Tracking user habits
(b) Intercepting user traffic
(c) Modifying server settings
(d) Blocking network data
11- What are Linux distributions?
(a) Versions of Linux
(b) Various distributions
(c) Software libraries
(d) Types of licenses
12- What does the term "SSID" stand for in wireless networking?
(a) Secure Standard Identification
(b) Secure Security Identity
(c) Service Set Identifier
(d) Super Simple Identity
13- What does the term "email security pipeline" refer to in the context of Cisco
ESA?
(a) Hardware processing
(b) Network encryption
(c) Data movement
(d) Email protection
14- What is the role of MAC flooding in network sniffing?
(a) Enhancing performance
(b) Improving security
(c) Analyzing MAC addresses
(d) Overloading network
15- What is the purpose of a web server attack methodology?
(a) Enhancing server performance
(b) Testing hardware security
(c) Analyzing network data
(d) Gaining unauthorized access
16- What is the main purpose of a web API hacking methodology?
(a) Developing web apps
(b) Analyzing network data
(c) Testing API security
(d) Enhancing user experience
17- What type of tools are used for SQL injection attacks?
(a) Database management
(b) Exploitation
(c) Network monitoring
(d) Antivirus
18- What is the purpose of a wireless hacking methodology?
(a) Analyzing network data
(b) Enhancing network performance
(c) Gaining unauthorized access
(d) Testing hardware security
19- What is the primary goal of database hardening in AWS?
(a) Enhancing user experience
(b) Protecting data integrity
(c) Improving hardware
(d) Testing database security
20- What is the primary purpose of filtering based on web URLs?
(a) Blocking malicious URLs
(b) Analyzing network data
(c) Enhancing network speed
(d) Isolating network URLs

__The End__
Roll no: 862317 Signatures
Name: sahiba shakeel
Candidate Signature
CNIC: 5440114038845
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What does AWS IAM primarily focus on?
(a) Analyzing hardware
(b) Monitoring internet usage
(c) Enforcing security policies
(d) Managing network devices
2- What does ASA stand for in the context of firewall technologies?
(a) Adaptive Security Appliance
(b) Advanced System Architecture
(c) Automated Security Appliance
(d) American Software Agency
3- What is the primary purpose of configuring policies on Cisco WSA?
(a) Blocking malicious data
(b) Enhancing user experience
(c) Testing software
(d) Increasing network speed
4- What is the purpose of countermeasures in the context of sniffing?
(a) Enhancing network security
(b) Analyzing hardware
(c) Isolating network devices
(d) Increasing network speed
5- What are some examples of wireless threats?
(a) Temperature changes
(b) Network latency
(c) Rain
(d) Unauthorized access
6- What does IP spoofing involve in network attacks?
(a) Enhancing network speed
(b) Blocking websites
(c) Changing email content
(d) Faking IP addresses
7- What does cybersecurity primarily focus on preventing?
(a) Environmental pollution
(b) Data breaches
(c) Political conflicts
(d) Physical theft
8- What is the purpose of initial setup/bootstrapping for Huawei USG6000v
Firewall?
(a) Testing hardware
(b) Enhancing security
(c) Installing software
(d) Isolating networks
9- What can effective cybersecurity prevent?
(a) Unauthorized access and data breaches
(b) Coffee spills
(c) Power outages
(d) Traffic congestion
10- What is the primary goal of DNS poisoning in network sniffing?
(a) Hiding network data
(b) Forging DNS responses
(c) Blocking network traffic
(d) Changing router settings
11- What is one of the primary objectives of cybersecurity professionals?
(a) Creating complex software applications
(b) Identifying new market opportunities
(c) Maximizing profits for the company
(d) Protecting digital assets and data
12- What is the primary difference between webhooks and a web shell?
(a) Functionality
(b) Security
(c) Usage
(d) Speed
13- What type of tool is Nikto in cybersecurity?
(a) Antivirus
(b) Firewall
(c) Intrusion detection system (IDS)
(d) Vulnerability scanner
14- What is a "blind" SQL injection attack?
(a) An attack involving blinking
(b) An attack targeting vision
(c) An attack performed blindly
(d) An attack without a motive
15- What is the purpose of using SQL injection to bypass website logins?
(a) Testing website speed
(b) Enhancing login security
(c) Gaining unauthorized access
(d) Increasing website traffic
16- What does "cloud computing" refer to?
(a) Data center
(b) Precipitation
(c) Water condensation
(d) Remote computing
17- What does the term "Modular Policy Framework" refer to in ASA firewalls?
(a) Network architectures
(b) Hardware modules
(c) Software configurations
(d) System frameworks
18- What term describes unauthorized access to computer systems for malicious
purposes?
(a) Hacking
(b) Software development
(c) Social engineering
(d) Cyber espionage
19- What is the primary purpose of different deployment models for Cisco ISE?
(a) Isolating networks
(b) Testing software
(c) Improving network speed
(d) Enhancing security
20- Which protocol can be used for both NetBIOS and SNMP enumeration?
(a) SMTP
(b) ICMP
(c) TCP/IP
(d) HTTPS

__The End__
Roll no: 862318 Signatures
Name: huma batool
Candidate Signature
CNIC: 5440169290516
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the purpose of creating a free-tier account on AWS by students?
(a) Creating free software
(b) Preventing data leaks
(c) Hosting websites
(d) Learning AWS services
2- What does the term "insider threats" refer to in cybersecurity?
(a) Threats from the outside
(b) Threats from internal sources
(c) Threats from competitors
(d) Threats from the future
3- What does a vulnerability scoring system do?
(a) Tracks system performance
(b) Assigns a score to identified risks
(c) Rates the value of software
(d) Prioritizes software development
4- What is the purpose of different deployment options for Cisco ESA?
(a) Testing software
(b) Enhancing network speed
(c) Improving network security
(d) Isolating networks
5- What are some types of policies in Cisco ISE?
(a) Enhancing network speed
(b) Analyzing network data
(c) Testing hardware
(d) Blocking data
6- What does the OWASP Top 10 list primarily focus on?
(a) Software usability
(b) Web application security
(c) Network performance
(d) Hardware vulnerabilities
7- What is the purpose of countermeasures in the context of sniffing?
(a) Enhancing network security
(b) Analyzing hardware
(c) Isolating network devices
(d) Increasing network speed
8- What is the primary purpose of a shell in a Linux system?
(a) Protecting hardware
(b) Interacting with users
(c) Managing electrical power
(d) Running software
9- Wireshark is primarily used for what purpose?
(a) Network analysis
(b) Data encryption
(c) Game development
(d) Hardware testing
10- What are Linux distributions?
(a) Versions of Linux
(b) Various distributions
(c) Software libraries
(d) Types of licenses
11- What is the primary need for Next-Generation Firewalls (NGFW)?
(a) Analyzing hardware
(b) Improving network speed
(c) Enhancing security
(d) Increasing latency
12- What is the primary purpose of configuring policies on Cisco WSA?
(a) Blocking malicious data
(b) Enhancing user experience
(c) Testing software
(d) Increasing network speed
13- What does the term "email security pipeline" refer to in the context of Cisco
ESA?
(a) Hardware processing
(b) Network encryption
(c) Data movement
(d) Email protection
14- What are countermeasures used for in the context of DOS/DDoS attacks?
(a) Improving network security
(b) Increasing attack complexity
(c) Enhancing attack speed
(d) Mitigating attack impact
15- What does ASA stand for in the context of firewall technologies?
(a) Adaptive Security Appliance
(b) Advanced System Architecture
(c) Automated Security Appliance
(d) American Software Agency
16- What is the purpose of using SQL injection to bypass website logins?
(a) Testing website speed
(b) Enhancing login security
(c) Gaining unauthorized access
(d) Increasing website traffic
17- What is the main goal of installing a Cisco Email Security Appliance (ESA)?
(a) Isolating networks
(b) Enhancing hardware
(c) Analyzing network data
(d) Improving security
18- Which type of encryption is considered the most secure among WEP, WPA, and
WPA2?
(a) WEP
(b) WPA
(c) WPA3
(d) WPA2
19- What is the purpose of a wireless hacking methodology?
(a) Analyzing network data
(b) Enhancing network performance
(c) Gaining unauthorized access
(d) Testing hardware security
20- What does AWS IAM primarily focus on?
(a) Analyzing hardware
(b) Monitoring internet usage
(c) Enforcing security policies
(d) Managing network devices

__The End__
Roll no: 862319 Signatures
Name: nargis
Candidate Signature
CNIC: 5440179342282
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is VLAN configuration used for in networking?
(a) Analyzing hardware
(b) Creating backup copies
(c) Managing virtual machines
(d) Routing network traffic
2- What does cybersecurity primarily focus on preventing?
(a) Environmental pollution
(b) Data breaches
(c) Political conflicts
(d) Physical theft
3- What is the primary purpose of wireless networks?
(a) Enhancing hardware
(b) Providing wireless connectivity
(c) Improving traffic flow
(d) Storing network data
4- What is the main goal of launching a SQL injection attack?
(a) Enhancing hardware
(b) Gaining unauthorized access
(c) Testing software
(d) Analyzing network traffic
5- What is the purpose of a web server attack methodology?
(a) Enhancing server performance
(b) Testing hardware security
(c) Analyzing network data
(d) Gaining unauthorized access
6- What is the primary goal of DNS poisoning in network sniffing?
(a) Hiding network data
(b) Forging DNS responses
(c) Blocking network traffic
(d) Changing router settings
7- What does the term "enumerate" refer to in the context of SQL injection?
(a) Counting the columns
(b) Calculating database entries
(c) Sorting the database
(d) Enumerating the database
8- What does the term "email security pipeline" refer to in the context of Cisco
ESA?
(a) Hardware processing
(b) Network encryption
(c) Data movement
(d) Email protection
9- What is the main purpose of a transparent firewall?
(a) Filtering packets
(b) Blocking data
(c) Analyzing traffic
(d) Enhancing hardware
10- What does the term "insider threats" refer to in cybersecurity?
(a) Threats from the outside
(b) Threats from internal sources
(c) Threats from competitors
(d) Threats from the future
11- What is AWS WAF primarily used for in the context of web application security?
(a) Blocking malicious data
(b) Hosting websites
(c) Enhancing hardware
(d) Networking
12- Which AWS access method allows programmatic interactions with AWS
services?
(a) Graphical User Interface
(b) Command Line Interface
(c) Software Development Kit
(d) Web Management Console
13- What is the purpose of countermeasures in the context of sniffing?
(a) Enhancing network security
(b) Analyzing hardware
(c) Isolating network devices
(d) Increasing network speed
14- What type of penetration test does not involve any prior knowledge of the
target system?
(a) White-box testing
(b) Grey-box testing
(c) Black-box testing
(d) Clear-box testing
15- What is the purpose of different deployment options for Cisco ESA?
(a) Testing software
(b) Enhancing network speed
(c) Improving network security
(d) Isolating networks
16- What is the main goal of installing and verifying Cisco WSA in different
deployment scenarios?
(a) Enhancing hardware
(b) Analyzing network data
(c) Isolating networks
(d) Improving security
17- What is the primary goal of online password attacks?
(a) Hardware maintenance
(b) Enhancing user privacy
(c) Gaining unauthorized access
(d) Installing software
18- What are some examples of web application threats?
(a) SQL injection
(b) Sunshine
(c) Rain
(d) Snow
19- What are countermeasures used for in the context of DOS/DDoS attacks?
(a) Improving network security
(b) Increasing attack complexity
(c) Enhancing attack speed
(d) Mitigating attack impact
20- Which protocol can be used for both NetBIOS and SNMP enumeration?
(a) SMTP
(b) ICMP
(c) TCP/IP
(d) HTTPS

__The End__
Roll no: 862320 Signatures
Name: nadia ali
Candidate Signature
CNIC: 5440162239738
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the main purpose of steganography in cybersecurity?
(a) Encrypting data
(b) Duplicating data
(c) Hiding data
(d) Erasing data
2- What are some types of policies in Cisco ISE?
(a) Enhancing network speed
(b) Analyzing network data
(c) Testing hardware
(d) Blocking data
3- What does enforcing acceptable usage control primarily involve?
(a) Increasing network speed
(b) Blocking data leaks
(c) Testing software
(d) Improving hardware
4- What is the role of MAC flooding in network sniffing?
(a) Enhancing performance
(b) Improving security
(c) Analyzing MAC addresses
(d) Overloading network
5- What is the purpose of file blocking in security policies?
(a) Increasing network speed
(b) Enhancing security
(c) Analyzing network data
(d) Improving hardware
6- What are countermeasures used for in the context of DOS/DDoS attacks?
(a) Improving network security
(b) Increasing attack complexity
(c) Enhancing attack speed
(d) Mitigating attack impact
7- What is the primary purpose of a DDoS protection scheme in AWS cloud?
(a) Enhancing network speed
(b) Analyzing network data
(c) Preventing data breaches
(d) Blocking malicious data
8- What does the term "SSID" stand for in wireless networking?
(a) Secure Standard Identification
(b) Secure Security Identity
(c) Service Set Identifier
(d) Super Simple Identity
9- What are some examples of web application threats?
(a) SQL injection
(b) Sunshine
(c) Rain
(d) Snow
10- What aspect of a target system can foot printing include?
(a) Personal preferences
(b) Office furniture
(c) Coffee machine
(d) Network hardware
11- CentOS is a Linux distribution that is based on which other distribution?
(a) Red Hat Enterprise Linux
(b) Fedora
(c) Ubuntu
(d) Debian
12- What is the primary purpose of security zones?
(a) Isolating networks
(b) Analyzing network data
(c) Increasing performance
(d) Enhancing hardware
13- What does the term "Modular Policy Framework" refer to in ASA firewalls?
(a) Network architectures
(b) Hardware modules
(c) Software configurations
(d) System frameworks
14- What is a vulnerability in the context of cybersecurity?
(a) A way to protect sensitive data
(b) A firewall rule
(c) A security measure
(d) A weakness in a system
15- Which of the following is a popular Linux distribution for penetration testing?
(a) CentOS
(b) Fedora
(c) OpenSUSE
(d) Ubuntu
16- What is the primary goal of a web cache poisoning attack?
(a) Enhancing website speed
(b) Analyzing network data
(c) Stealing user data
(d) Modifying network data
17- What does cybersecurity primarily focus on preventing?
(a) Environmental pollution
(b) Data breaches
(c) Political conflicts
(d) Physical theft
18- What is the main purpose of firewall access control?
(a) Restricting network access
(b) Enhancing hardware
(c) Analyzing network data
(d) Testing software
19- What is the main purpose of using WebCruiser in relation to SQL injection?
(a) Enhancing user experience
(b) Hosting websites
(c) Testing software
(d) Analyzing network traffic
20- What does social engineering primarily rely on to manipulate people?
(a) Logical reasoning
(b) Psychological manipulation
(c) Physical strength
(d) Technical knowledge

__The End__
Roll no: 862321 Signatures
Name: farwa syed
Candidate Signature
CNIC: 5440121837192
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is one type of session hijacking that involves intercepting network traffic?
(a) Physical assault
(b) Replay attack
(c) Social engineering
(d) Network intrusion
2- What does the term "Kubernetes vulnerability" refer to?
(a) Data encryption
(b) Hardware performance
(c) Network security
(d) Software weaknesses
3- What are some types of policies in Cisco ISE?
(a) Enhancing network speed
(b) Analyzing network data
(c) Testing hardware
(d) Blocking data
4- What does website defacement involve?
(a) Changing hardware
(b) Improving website layout
(c) Blocking network data
(d) Unauthorized modification
5- What is the primary goal of database hardening in AWS?
(a) Enhancing user experience
(b) Protecting data integrity
(c) Improving hardware
(d) Testing database security
6- What does DNS enumeration involve?
(a) Checking server time synchronization
(b) Scanning for open ports
(c) Gathering information about network hosts
(d) Exploiting DNS vulnerabilities
7- What type of penetration test does not involve any prior knowledge of the target
system?
(a) White-box testing
(b) Grey-box testing
(c) Black-box testing
(d) Clear-box testing
8- What is the purpose of countermeasures in the context of sniffing?
(a) Enhancing network security
(b) Analyzing hardware
(c) Isolating network devices
(d) Increasing network speed
9- What is the primary goal of DNS poisoning in network sniffing?
(a) Hiding network data
(b) Forging DNS responses
(c) Blocking network traffic
(d) Changing router settings
10- What does the term "enumeration" refer to in cybersecurity?
(a) Exploiting software vulnerabilities
(b) Creating a list of network protocols
(c) Scanning for open ports
(d) Gathering information about a target
11- What does the term "Modular Policy Framework" refer to in ASA firewalls?
(a) Network architectures
(b) Hardware modules
(c) Software configurations
(d) System frameworks
12- What is the primary purpose of different deployment models for Cisco ISE?
(a) Isolating networks
(b) Testing software
(c) Improving network speed
(d) Enhancing security
13- What is the purpose of Network Address Translation (NAT) on ASA?
(a) Preventing network attacks
(b) Enhancing network speed
(c) Analyzing network data
(d) Hiding internal IPs
14- What is the primary goal of virtualization on ASA firewalls?
(a) Improving network speed
(b) Enhancing storage
(c) Isolating networks
(d) Virtualizing hardware
15- What is the purpose of using SQL injection to bypass website logins?
(a) Testing website speed
(b) Enhancing login security
(c) Gaining unauthorized access
(d) Increasing website traffic
16- Which software is commonly used for creating virtual machines?
(a) Adobe Photoshop
(b) Microsoft Office
(c) Google Chrome
(d) VMware Workstation
17- What type of software is the Apache server?
(a) Email server
(b) DNS server
(c) Database server
(d) Web server
18- What is the primary purpose of creating a WAF protection profile?
(a) Testing software
(b) Blocking malicious data
(c) Enhancing security
(d) Isolating networks
19- What is the primary goal of vulnerability assessment tools?
(a) Identifying and assessing weaknesses
(b) Blocking network traffic
(c) Exploiting discovered vulnerabilities
(d) Creating secure passwords
20- What is AWS WAF primarily used for in the context of web application security?
(a) Blocking malicious data
(b) Hosting websites
(c) Enhancing hardware
(d) Networking

__The End__
Roll no: 862322 Signatures
Name: saeeda
Candidate Signature
CNIC: 5440193754236
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the purpose of a web server attack methodology?
(a) Enhancing server performance
(b) Testing hardware security
(c) Analyzing network data
(d) Gaining unauthorized access
2- What is one type of session hijacking that involves intercepting network traffic?
(a) Physical assault
(b) Replay attack
(c) Social engineering
(d) Network intrusion
3- What is the main benefit of ASA clustering?
(a) Grouping hardware
(b) Analyzing network data
(c) Enhancing security
(d) Protecting user data
4- What does "traffic flow" refer to in the context of firewalls?
(a) Data movement
(b) Blood circulation
(c) Network design
(d) Network security
5- What does the OWASP Top 10 list primarily focus on?
(a) Software usability
(b) Web application security
(c) Network performance
(d) Hardware vulnerabilities
6- What is the primary purpose of monitoring and reporting in security policies?
(a) Increasing performance
(b) Analyzing network data
(c) Enhancing network speed
(d) Improving hardware
7- What type of software is the Apache server?
(a) Email server
(b) DNS server
(c) Database server
(d) Web server
8- What is the main goal of a web application hacking methodology?
(a) Fixing hardware
(b) Gaining unauthorized access
(c) Ensuring software quality
(d) Testing software
9- What is the primary goal of online password attacks?
(a) Hardware maintenance
(b) Enhancing user privacy
(c) Gaining unauthorized access
(d) Installing software
10- What is the main goal of launching a SQL injection attack?
(a) Enhancing hardware
(b) Gaining unauthorized access
(c) Testing software
(d) Analyzing network traffic
11- What does the term "insider threats" refer to in cybersecurity?
(a) Threats from the outside
(b) Threats from internal sources
(c) Threats from competitors
(d) Threats from the future
12- What type of attack is the "Ping of Death"?
(a) Scanning for vulnerabilities
(b) Blocking incoming data
(c) Capturing passwords
(d) Flooding a network
13- What is the primary purpose of creating a WAF protection profile?
(a) Testing software
(b) Blocking malicious data
(c) Enhancing security
(d) Isolating networks
14- What are Linux distributions?
(a) Versions of Linux
(b) Various distributions
(c) Software libraries
(d) Types of licenses
15- What do web server security tools primarily focus on?
(a) Preventing website attacks
(b) Enhancing user experience
(c) Analyzing network data
(d) Improving hardware
16- What aspect of a target system can foot printing include?
(a) Personal preferences
(b) Office furniture
(c) Coffee machine
(d) Network hardware
17- What are some key features and functionalities of Cisco Email Security
Appliance (ESA)?
(a) Blocking malicious data
(b) Enhancing security
(c) Analyzing network traffic
(d) Improving hardware
18- What is one of the primary objectives of cybersecurity professionals?
(a) Creating complex software applications
(b) Identifying new market opportunities
(c) Maximizing profits for the company
(d) Protecting digital assets and data
19- What is the main purpose of a web API hacking methodology?
(a) Developing web apps
(b) Analyzing network data
(c) Testing API security
(d) Enhancing user experience
20- Which software is commonly used for creating virtual machines?
(a) Adobe Photoshop
(b) Microsoft Office
(c) Google Chrome
(d) VMware Workstation

__The End__
Roll no: 862323 Signatures
Name: zainab
Candidate Signature
CNIC: 5440035837290
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What do web server security tools primarily focus on?
(a) Preventing website attacks
(b) Enhancing user experience
(c) Analyzing network data
(d) Improving hardware
2- What does "footprinting" in cybersecurity refer to?
(a) Physical tracing
(b) Gathering network statistics
(c) Collecting digital fingerprints
(d) Unauthorized access
3- What does "confidentiality" refer to in information security?
(a) Making data easily accessible to anyone
(b) Increasing the speed of data transmission
(c) Ensuring data is accurate and reliable
(d) Protecting data from unauthorized access
4- What is AWS WAF primarily used for in the context of web application security?
(a) Blocking malicious data
(b) Hosting websites
(c) Enhancing hardware
(d) Networking
5- Which protocol can be used for both NetBIOS and SNMP enumeration?
(a) SMTP
(b) ICMP
(c) TCP/IP
(d) HTTPS
6- What do SQL injection detection tools primarily focus on?
(a) Encrypting data
(b) Analyzing network data
(c) Enhancing hardware
(d) Preventing SQL injection
7- What does "traffic flow" refer to in the context of firewalls?
(a) Data movement
(b) Blood circulation
(c) Network design
(d) Network security
8- What is the purpose of Linux user groups?
(a) Grouping food items
(b) Grouping hardware parts
(c) Grouping programming languages
(d) Grouping user accounts
9- What does the term "sniffing" refer to in the context of networking?
(a) Scanning hardware
(b) Filtering email
(c) Deleting software
(d) Capturing network data
10- Which type of encryption is considered the most secure among WEP, WPA, and
WPA2?
(a) WEP
(b) WPA
(c) WPA3
(d) WPA2
11- What is a pretexting technique in social engineering?
(a) Creating fake identities
(b) Using brute force
(c) Making valid requests
(d) Forging email addresses
12- What is the primary purpose of a DDoS protection scheme in AWS cloud?
(a) Enhancing network speed
(b) Analyzing network data
(c) Preventing data breaches
(d) Blocking malicious data
13- What term describes unauthorized access to computer systems for malicious
purposes?
(a) Hacking
(b) Software development
(c) Social engineering
(d) Cyber espionage
14- Which AWS access method allows programmatic interactions with AWS
services?
(a) Graphical User Interface
(b) Command Line Interface
(c) Software Development Kit
(d) Web Management Console
15- What is VLAN configuration used for in networking?
(a) Analyzing hardware
(b) Creating backup copies
(c) Managing virtual machines
(d) Routing network traffic
16- What is the purpose of a vulnerability assessment report?
(a) Showcase hardware
(b) Identify attackers
(c) Document findings
(d) Describe the weather
17- What is the purpose of controlling sender and recipient domains in Cisco ESA?
(a) Analyzing network data
(b) Enhancing security
(c) Improving hardware
(d) Isolating networks
18- What is the primary goal of DNS poisoning in network sniffing?
(a) Hiding network data
(b) Forging DNS responses
(c) Blocking network traffic
(d) Changing router settings
19- What does the term "SSID" stand for in wireless networking?
(a) Secure Standard Identification
(b) Secure Security Identity
(c) Service Set Identifier
(d) Super Simple Identity
20- Which term refers to the practice of having multiple layers of security to
protect information?
(a) Information defense-in-depth
(b) Singular protection
(c) Single defense
(d) Isolated control

__The End__
Roll no: 862324 Signatures
Name: Farhana Batool
Candidate Signature
CNIC: 5440049689186
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What does DHCP starvation involve in network sniffing?
(a) Encrypting network data
(b) Flooding DHCP requests
(c) Overloading DNS servers
(d) Consuming too much power
2- What does enforcing acceptable usage control primarily involve?
(a) Increasing network speed
(b) Blocking data leaks
(c) Testing software
(d) Improving hardware
3- What does AWS IAM primarily focus on?
(a) Analyzing hardware
(b) Monitoring internet usage
(c) Enforcing security policies
(d) Managing network devices
4- What is the main need for a Web Application Firewall (WAF)?
(a) Increasing latency
(b) Blocking data leaks
(c) Improving network speed
(d) Enhancing security
5- What is one of the primary objectives of cybersecurity professionals?
(a) Creating complex software applications
(b) Identifying new market opportunities
(c) Maximizing profits for the company
(d) Protecting digital assets and data
6- What is the primary goal of vulnerability assessment tools?
(a) Identifying and assessing weaknesses
(b) Blocking network traffic
(c) Exploiting discovered vulnerabilities
(d) Creating secure passwords
7- What does the term "enumeration" refer to in cybersecurity?
(a) Exploiting software vulnerabilities
(b) Creating a list of network protocols
(c) Scanning for open ports
(d) Gathering information about a target
8- What is session hijacking in the context of cybersecurity?
(a) Capturing network data
(b) Forging digital signatures
(c) Modifying user behavior
(d) Stealing passwords
9- What does a security policy consist of?
(a) Hardware settings
(b) System configurations
(c) Network topologies
(d) Software interfaces
10- What is the primary purpose of a DDoS protection scheme in AWS cloud?
(a) Enhancing network speed
(b) Analyzing network data
(c) Preventing data breaches
(d) Blocking malicious data
11- What does "Time-Based Blind SQL Injection" involve?
(a) Exploiting vulnerabilities
(b) Capturing passwords
(c) Injecting time
(d) Manipulating cookies
12- What are some key features and functionalities of Cisco Web Security Appliance
(WSA)?
(a) Improving hardware
(b) Analyzing network traffic
(c) Enhancing security
(d) Blocking malicious data
13- What is the primary goal of online password attacks?
(a) Hardware maintenance
(b) Enhancing user privacy
(c) Gaining unauthorized access
(d) Installing software
14- What is the primary purpose of security zones?
(a) Isolating networks
(b) Analyzing network data
(c) Increasing performance
(d) Enhancing hardware
15- What is the main goal of identity management in Cisco ISE?
(a) Improving security
(b) Managing user identities
(c) Analyzing network data
(d) Enhancing hardware
16- What does the OWASP Top 10 list primarily focus on?
(a) Software usability
(b) Web application security
(c) Network performance
(d) Hardware vulnerabilities
17- What is the purpose of using SQL injection to bypass website logins?
(a) Testing website speed
(b) Enhancing login security
(c) Gaining unauthorized access
(d) Increasing website traffic
18- What is the role of a Web Application Firewall (WAF) like F5 ASM in
cybersecurity?
(a) Preventing malware
(b) Enhancing hardware
(c) Protecting web apps
(d) Network monitoring
19- What is a "blind" SQL injection attack?
(a) An attack involving blinking
(b) An attack targeting vision
(c) An attack performed blindly
(d) An attack without a motive
20- What is the primary purpose of creating a WAF protection profile?
(a) Testing software
(b) Blocking malicious data
(c) Enhancing security
(d) Isolating networks

__The End__
Roll no: 862325 Signatures
Name: fatima
Candidate Signature
CNIC: 5440185490648
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the primary purpose of AWS Elastic Compute Cloud (EC2)?
(a) Managing virtual machines
(b) Enhancing data storage
(c) Hosting websites
(d) Creating container images
2- What is the main goal of filtering based on application visibility and control?
(a) Blocking applications
(b) Enhancing hardware
(c) Analyzing data traffic
(d) Testing software
3- What is the main purpose of firewall access control?
(a) Restricting network access
(b) Enhancing hardware
(c) Analyzing network data
(d) Testing software
4- What does "footprinting" in cybersecurity refer to?
(a) Physical tracing
(b) Gathering network statistics
(c) Collecting digital fingerprints
(d) Unauthorized access
5- What can network footprinting involve?
(a) Verifying software licenses
(b) Identifying network hardware
(c) Organizing office spaces
(d) Analyzing coffee preferences
6- What are some key features and functionalities of Cisco Email Security Appliance
(ESA)?
(a) Blocking malicious data
(b) Enhancing security
(c) Analyzing network traffic
(d) Improving hardware
7- What is the main purpose of a web API hacking methodology?
(a) Developing web apps
(b) Analyzing network data
(c) Testing API security
(d) Enhancing user experience
8- What is the role of MAC flooding in network sniffing?
(a) Enhancing performance
(b) Improving security
(c) Analyzing MAC addresses
(d) Overloading network
9- What is the main goal of launching a SQL injection attack?
(a) Enhancing hardware
(b) Gaining unauthorized access
(c) Testing software
(d) Analyzing network traffic
10- What does the OWASP Top 10 list primarily focus on?
(a) Software usability
(b) Web application security
(c) Network performance
(d) Hardware vulnerabilities
11- What is the primary purpose of wireless networks?
(a) Enhancing hardware
(b) Providing wireless connectivity
(c) Improving traffic flow
(d) Storing network data
12- What are some key features and functionalities of Cisco Web Security Appliance
(WSA)?
(a) Improving hardware
(b) Analyzing network traffic
(c) Enhancing security
(d) Blocking malicious data
13- What is the main need for a Web Application Firewall (WAF)?
(a) Increasing latency
(b) Blocking data leaks
(c) Improving network speed
(d) Enhancing security
14- What type of attack is the "Ping of Death"?
(a) Scanning for vulnerabilities
(b) Blocking incoming data
(c) Capturing passwords
(d) Flooding a network
15- What does the term "email security pipeline" refer to in the context of Cisco
ESA?
(a) Hardware processing
(b) Network encryption
(c) Data movement
(d) Email protection
16- What does the term "insider threats" refer to in cybersecurity?
(a) Threats from the outside
(b) Threats from internal sources
(c) Threats from competitors
(d) Threats from the future
17- What is the main goal of a SQL injection attack?
(a) Enhancing database speed
(b) Gaining unauthorized access
(c) Analyzing network data
(d) Blocking data
18- What is the purpose of different deployment models for firewalls?
(a) Isolating networks
(b) Analyzing network data
(c) Enhancing hardware
(d) Improving network speed
19- Which statement best describes a "white hat" hacker?
(a) An ethical hacker who helps identify security vulnerabilities
(b) A hacker who is motivated by financial gain
(c) Someone who wears a white hat
(d) A hacker who only targets government agencies
20- What is the purpose of creating a free-tier account on AWS by students?
(a) Creating free software
(b) Preventing data leaks
(c) Hosting websites
(d) Learning AWS services

__The End__
Roll no: 862326 Signatures
Name: masooma
Candidate Signature
CNIC: 5440193075772
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the primary purpose of monitoring and reporting in security policies?
(a) Increasing performance
(b) Analyzing network data
(c) Enhancing network speed
(d) Improving hardware
2- What is the primary purpose of configuring policies on Cisco WSA?
(a) Blocking malicious data
(b) Enhancing user experience
(c) Testing software
(d) Increasing network speed
3- What does the OWASP Top 10 list primarily focus on?
(a) Software usability
(b) Web application security
(c) Network performance
(d) Hardware vulnerabilities
4- What does the term "Kubernetes vulnerability" refer to?
(a) Data encryption
(b) Hardware performance
(c) Network security
(d) Software weaknesses
5- What aspect of a target system can foot printing include?
(a) Personal preferences
(b) Office furniture
(c) Coffee machine
(d) Network hardware
6- What is the primary goal of database hardening in AWS?
(a) Enhancing user experience
(b) Protecting data integrity
(c) Improving hardware
(d) Testing database security
7- What is the purpose of a wireless hacking methodology?
(a) Analyzing network data
(b) Enhancing network performance
(c) Gaining unauthorized access
(d) Testing hardware security
8- What is the purpose of a web server attack methodology?
(a) Enhancing server performance
(b) Testing hardware security
(c) Analyzing network data
(d) Gaining unauthorized access
9- What are some types of policies in Cisco ISE?
(a) Enhancing network speed
(b) Analyzing network data
(c) Testing hardware
(d) Blocking data
10- What is the primary purpose of filtering based on web URLs?
(a) Blocking malicious URLs
(b) Analyzing network data
(c) Enhancing network speed
(d) Isolating network URLs
11- What are some examples of web application threats?
(a) SQL injection
(b) Sunshine
(c) Rain
(d) Snow
12- Which term refers to the practice of having multiple layers of security to
protect information?
(a) Information defense-in-depth
(b) Singular protection
(c) Single defense
(d) Isolated control
13- What is the primary purpose of different deployment models for Cisco ISE?
(a) Isolating networks
(b) Testing software
(c) Improving network speed
(d) Enhancing security
14- What is the objective of system hacking in the context of cybersecurity?
(a) Enhancing network security
(b) Enhancing user experience
(c) Improving system performance
(d) Accessing or damaging systems
15- What is the main goal of intrusion detection and prevention (IPS)?
(a) Isolating networks
(b) Improving network speed
(c) Blocking malicious data
(d) Enhancing security
16- What is the main need for a Web Application Firewall (WAF)?
(a) Increasing latency
(b) Blocking data leaks
(c) Improving network speed
(d) Enhancing security
17- What does "Time-Based Blind SQL Injection" involve?
(a) Exploiting vulnerabilities
(b) Capturing passwords
(c) Injecting time
(d) Manipulating cookies
18- What is ASDM used for in the context of firewall initialization?
(a) Automated Security Deployment
(b) Analyzing system data
(c) Active System Defense Module
(d) Application Security Development Manager
19- Wireshark is primarily used for what purpose?
(a) Network analysis
(b) Data encryption
(c) Game development
(d) Hardware testing
20- What does website defacement involve?
(a) Changing hardware
(b) Improving website layout
(c) Blocking network data
(d) Unauthorized modification

__The End__
Roll no: 862327 Signatures
Name: Anzalna Nadeem
Candidate Signature
CNIC: 5440195038470
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the primary purpose of different deployment models for Cisco ISE?
(a) Isolating networks
(b) Testing software
(c) Improving network speed
(d) Enhancing security
2- What is the purpose of scanning in cybersecurity?
(a) Gathering reconnaissance information
(b) Monitoring network traffic
(c) Copying sensitive data
(d) Retrieving emails
3- What is the role of a Web Application Firewall (WAF) like F5 ASM in
cybersecurity?
(a) Preventing malware
(b) Enhancing hardware
(c) Protecting web apps
(d) Network monitoring
4- Wireshark is primarily used for what purpose?
(a) Network analysis
(b) Data encryption
(c) Game development
(d) Hardware testing
5- What does the term "sniffing" refer to in the context of networking?
(a) Scanning hardware
(b) Filtering email
(c) Deleting software
(d) Capturing network data
6- What does cybersecurity primarily focus on preventing?
(a) Environmental pollution
(b) Data breaches
(c) Political conflicts
(d) Physical theft
7- How can search engines be used for footprinting?
(a) Finding local businesses
(b) Identifying software vulnerabilities
(c) Discovering sensitive information
(d) Identifying common passwords
8- What can network footprinting involve?
(a) Verifying software licenses
(b) Identifying network hardware
(c) Organizing office spaces
(d) Analyzing coffee preferences
9- What type of software is the Apache server?
(a) Email server
(b) DNS server
(c) Database server
(d) Web server
10- What is the purpose of controlling sender and recipient domains in Cisco ESA?
(a) Analyzing network data
(b) Enhancing security
(c) Improving hardware
(d) Isolating networks
11- What is the primary goal of a web cache poisoning attack?
(a) Enhancing website speed
(b) Analyzing network data
(c) Stealing user data
(d) Modifying network data
12- What is the primary need for Next-Generation Firewalls (NGFW)?
(a) Analyzing hardware
(b) Improving network speed
(c) Enhancing security
(d) Increasing latency
13- What is the main need for a Web Application Firewall (WAF)?
(a) Increasing latency
(b) Blocking data leaks
(c) Improving network speed
(d) Enhancing security
14- What does "footprinting" in cybersecurity refer to?
(a) Physical tracing
(b) Gathering network statistics
(c) Collecting digital fingerprints
(d) Unauthorized access
15- What is the purpose of file blocking in security policies?
(a) Increasing network speed
(b) Enhancing security
(c) Analyzing network data
(d) Improving hardware
16- What is the main advantage of serverless computing in cloud environments?
(a) Enhancing software speed
(b) Analyzing network data
(c) Managing network devices
(d) Reducing server management
17- What is the main purpose of firewall access control?
(a) Restricting network access
(b) Enhancing hardware
(c) Analyzing network data
(d) Testing software
18- What aspect of a target system can foot printing include?
(a) Personal preferences
(b) Office furniture
(c) Coffee machine
(d) Network hardware
19- What are Linux distributions?
(a) Versions of Linux
(b) Various distributions
(c) Software libraries
(d) Types of licenses
20- What is the main goal of installing and verifying Cisco WSA in different
deployment scenarios?
(a) Enhancing hardware
(b) Analyzing network data
(c) Isolating networks
(d) Improving security

__The End__
Roll no: 862328 Signatures
Name: hameeda
Candidate Signature
CNIC: 5440124419230
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What is the primary goal of defending against malware using Cisco WSA?
(a) Analyzing network data
(b) Increasing latency
(c) Enhancing user privacy
(d) Blocking malicious data
2- What is the primary purpose of filtering based on web URLs?
(a) Blocking malicious URLs
(b) Analyzing network data
(c) Enhancing network speed
(d) Isolating network URLs
3- What aspect of a target system can foot printing include?
(a) Personal preferences
(b) Office furniture
(c) Coffee machine
(d) Network hardware
4- What are some key features and functionalities of Cisco Web Security Appliance
(WSA)?
(a) Improving hardware
(b) Analyzing network traffic
(c) Enhancing security
(d) Blocking malicious data
5- What does DNS enumeration involve?
(a) Checking server time synchronization
(b) Scanning for open ports
(c) Gathering information about network hosts
(d) Exploiting DNS vulnerabilities
6- What is the main purpose of a web API hacking methodology?
(a) Developing web apps
(b) Analyzing network data
(c) Testing API security
(d) Enhancing user experience
7- Wireshark is primarily used for what purpose?
(a) Network analysis
(b) Data encryption
(c) Game development
(d) Hardware testing
8- What is the primary difference between phishing and pharming?
(a) Targeting individuals
(b) Targeting systems
(c) Targeting software
(d) Targeting wireless networks
9- CentOS is a Linux distribution that is based on which other distribution?
(a) Red Hat Enterprise Linux
(b) Fedora
(c) Ubuntu
(d) Debian
10- Which deployment model allows multiple organizations to share a single cloud
instance?
(a) Hybrid Cloud
(b) Community Cloud
(c) Private Cloud
(d) Public Cloud
11- What is the primary goal of a web cache poisoning attack?
(a) Enhancing website speed
(b) Analyzing network data
(c) Stealing user data
(d) Modifying network data
12- What does "footprinting" in cybersecurity refer to?
(a) Physical tracing
(b) Gathering network statistics
(c) Collecting digital fingerprints
(d) Unauthorized access
13- What does "traffic flow" refer to in the context of firewalls?
(a) Data movement
(b) Blood circulation
(c) Network design
(d) Network security
14- What are some types of policies in Cisco ISE?
(a) Enhancing network speed
(b) Analyzing network data
(c) Testing hardware
(d) Blocking data
15- What is the main advantage of serverless computing in cloud environments?
(a) Enhancing software speed
(b) Analyzing network data
(c) Managing network devices
(d) Reducing server management
16- What is the primary goal of virtualization on ASA firewalls?
(a) Improving network speed
(b) Enhancing storage
(c) Isolating networks
(d) Virtualizing hardware
17- What is the purpose of controlling sender and recipient domains in Cisco ESA?
(a) Analyzing network data
(b) Enhancing security
(c) Improving hardware
(d) Isolating networks
18- What type of tool is Nikto in cybersecurity?
(a) Antivirus
(b) Firewall
(c) Intrusion detection system (IDS)
(d) Vulnerability scanner
19- What does "cloud computing" refer to?
(a) Data center
(b) Precipitation
(c) Water condensation
(d) Remote computing
20- What does the term "sniffing" refer to in the context of networking?
(a) Scanning hardware
(b) Filtering email
(c) Deleting software
(d) Capturing network data

__The End__
Roll no: 862329 Signatures
Name: Ruquia
Candidate Signature
CNIC: 5440151531416
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What does wireless encryption aim to achieve?
(a) Analyzing network traffic
(b) Monitoring wireless data
(c) Enhancing hardware performance
(d) Protecting data
2- What does the term "email security pipeline" refer to in the context of Cisco
ESA?
(a) Hardware processing
(b) Network encryption
(c) Data movement
(d) Email protection
3- What aspect of a target system can foot printing include?
(a) Personal preferences
(b) Office furniture
(c) Coffee machine
(d) Network hardware
4- What is the primary goal of online password attacks?
(a) Hardware maintenance
(b) Enhancing user privacy
(c) Gaining unauthorized access
(d) Installing software
5- What is the main purpose of steganography in cybersecurity?
(a) Encrypting data
(b) Duplicating data
(c) Hiding data
(d) Erasing data
6- What is the main purpose of cracking Wi-Fi encryption?
(a) Analyzing network data
(b) Unauthorized access
(c) Increasing network speed
(d) Enhancing security
7- What is the primary purpose of configuring policies on Cisco WSA?
(a) Blocking malicious data
(b) Enhancing user experience
(c) Testing software
(d) Increasing network speed
8- What is the main goal of identity management in Cisco ISE?
(a) Improving security
(b) Managing user identities
(c) Analyzing network data
(d) Enhancing hardware
9- What is one of the primary objectives of cybersecurity professionals?
(a) Creating complex software applications
(b) Identifying new market opportunities
(c) Maximizing profits for the company
(d) Protecting digital assets and data
10- What does the term "Kubernetes vulnerability" refer to?
(a) Data encryption
(b) Hardware performance
(c) Network security
(d) Software weaknesses
11- What is one type of session hijacking that involves intercepting network traffic?
(a) Physical assault
(b) Replay attack
(c) Social engineering
(d) Network intrusion
12- CentOS is a Linux distribution that is based on which other distribution?
(a) Red Hat Enterprise Linux
(b) Fedora
(c) Ubuntu
(d) Debian
13- What type of tools are commonly used for web server attacks?
(a) Exploitation tools
(b) Hardware tools
(c) Network monitoring
(d) Testing software
14- What type of tools are used for SQL injection attacks?
(a) Database management
(b) Exploitation
(c) Network monitoring
(d) Antivirus
15- What is the purpose of SSL decryption in security policies?
(a) Analyzing network data
(b) Increasing privacy
(c) Enhancing security
(d) Improving hardware
16- What is the main advantage of serverless computing in cloud environments?
(a) Enhancing software speed
(b) Analyzing network data
(c) Managing network devices
(d) Reducing server management
17- What is the purpose of countermeasures in the context of sniffing?
(a) Enhancing network security
(b) Analyzing hardware
(c) Isolating network devices
(d) Increasing network speed
18- What is the purpose of a SQL injection methodology?
(a) Testing software
(b) Analyzing network data
(c) Detecting malware
(d) Enhancing database speed
19- What does the term "insider threats" refer to in cybersecurity?
(a) Threats from the outside
(b) Threats from internal sources
(c) Threats from competitors
(d) Threats from the future
20- What is the primary purpose of Lynis in the context of cybersecurity?
(a) Firewall
(b) Intrusion Detection System
(c) Web Application Firewall
(d) Vulnerability Scanner

__The End__
Roll no: 862330 Signatures
Name: Bibi zahra
Candidate Signature
CNIC: 5440039773202
Trade: Digital Forensic & Cyber Security
Test Date & Time: 08/06/2024 04:00 PM Examiner Signature & Stamp
Test Center Name: college of international skills
development hassan moosa girls college quetta campus
Principal Signature
Examiner Name: Vikash Kumar / Hasnan Amin

Instructions:
Please read instructions carefully before attempting paper:
1) All questions are compulsory.
2) The question paper consists of 21 questions divided into two sections A & B. Section A comprise of 20 MCQs of 1 marks
each. Section B comprises of 1 practical task having 80 marks.
3) Mobile Phone not allowed.
4) Use separate paper for rough work.

Section A - Theory (Total Marks: 20, Time: 30 Minutes)


1- What type of penetration test does not involve any prior knowledge of the target
system?
(a) White-box testing
(b) Grey-box testing
(c) Black-box testing
(d) Clear-box testing
2- What is the primary difference between phishing and pharming?
(a) Targeting individuals
(b) Targeting systems
(c) Targeting software
(d) Targeting wireless networks
3- What is enumeration in the context of cybersecurity?
(a) Process of finding software vulnerabilities
(b) Process of listing user accounts
(c) Process of hardware configuration mapping
(d) Process of mapping network topology
4- What does the term "Modular Policy Framework" refer to in ASA firewalls?
(a) Network architectures
(b) Hardware modules
(c) Software configurations
(d) System frameworks
5- What type of tools are used for SQL injection attacks?
(a) Database management
(b) Exploitation
(c) Network monitoring
(d) Antivirus
6- What does a vulnerability scoring system do?
(a) Tracks system performance
(b) Assigns a score to identified risks
(c) Rates the value of software
(d) Prioritizes software development
7- What is the main goal of intrusion detection and prevention (IPS)?
(a) Isolating networks
(b) Improving network speed
(c) Blocking malicious data
(d) Enhancing security
8- What is the purpose of SSL decryption in security policies?
(a) Analyzing network data
(b) Increasing privacy
(c) Enhancing security
(d) Improving hardware
9- Which AWS service provides stateful filtering for both inbound and outbound
traffic?
(a) Network ACLs
(b) CloudWatch
(c) AWS Network Firewall
(d) Security Groups
10- What is the primary purpose of creating a WAF protection profile?
(a) Testing software
(b) Blocking malicious data
(c) Enhancing security
(d) Isolating networks
11- What type of software is the Apache server?
(a) Email server
(b) DNS server
(c) Database server
(d) Web server
12- What does the term "Kubernetes vulnerability" refer to?
(a) Data encryption
(b) Hardware performance
(c) Network security
(d) Software weaknesses
13- In Linux, what does the term "owner" of a file refer to?
(a) Someone who made it
(b) Someone who borrows it
(c) Someone who owns it
(d) Someone who uses it
14- What is a vulnerability in the context of cybersecurity?
(a) A way to protect sensitive data
(b) A firewall rule
(c) A security measure
(d) A weakness in a system
15- What is the objective of system hacking in the context of cybersecurity?
(a) Enhancing network security
(b) Enhancing user experience
(c) Improving system performance
(d) Accessing or damaging systems
16- What is the role of a Web Application Firewall (WAF) like F5 ASM in
cybersecurity?
(a) Preventing malware
(b) Enhancing hardware
(c) Protecting web apps
(d) Network monitoring
17- What is a pretexting technique in social engineering?
(a) Creating fake identities
(b) Using brute force
(c) Making valid requests
(d) Forging email addresses
18- What does website defacement involve?
(a) Changing hardware
(b) Improving website layout
(c) Blocking network data
(d) Unauthorized modification
19- What is session hijacking in the context of cybersecurity?
(a) Capturing network data
(b) Forging digital signatures
(c) Modifying user behavior
(d) Stealing passwords
20- What type of attack is the "Ping of Death"?
(a) Scanning for vulnerabilities
(b) Blocking incoming data
(c) Capturing passwords
(d) Flooding a network

__The End__

You might also like