Sunday 7 February 2021

07 Feb Networking Test Result

 

07 Feb Networking Test Result 

S.No.

Name

Marks

1

Raj Kumar Gupta

50

2

Kundan Kumar Rana

40

3

Gaurav Gahlot

39

4

Manasi Adhikary

38

5

Yugalkishore Tiwari

38

6

Suruchi

36

7

Vansh

35

8

Ankur Bhardwaj

35

9

Kirti

35

10

Divya...

34

11

Aksh Gupta

33

12

Sanjeev

33

13

Poonam Yadav

32

14

Shubham Bhardwaj

32

15

Anil Yadav

31

16

Mittu Sharma

30

17

Meerayadav

30

18

Mukesh Roy

30

19

Pritam Kumari

29

20

Rakesh

29

21

Sagar

29

22

Sanjeev

29

23

Annu

28

24

Gaurav Chaudhary

28

25

Mittu

28

26

Nancy

28

27

Deepanshu

28

28

Ajay Gupta

28

29

Chirag Kashyap

28

30

Himanshu

28

31

Neety Yadav

27

32

Anuj Kashyap

27

33

Divya Mishra

27

34

Harshita

26

35

Sunaina Bizenia

26

36

Priyanka Arora

26

37

Shahib

26

38

Tushar Chandila

25

39

Sandhya

25

40

Priya Chaurasia

25

41

Preeti

24

42

Rahul Kumar

24

43

Lalit Gupta

24

44

Sachin

23

45

Chirag Kashyap

23

46

Md Tehran

23

47

Dilip Gupta

23

48

Priyanka Soni

22

49

Sonika Beniwal

22

50

Dinesh Kumar Singh

22

51

Vibhakar

22

52

Chandan

22

53

Vipin Kumar

22

54

Sanjay

22

55

Ankit Pandey

22

56

Suman

21

57

Sandeep

21

58

Shehbaz

21

59

Akanksha

21

60

Krishan Pal

20

61

Vinod

20

62

Ranjeet Yadav

20

63

Vijay Kushawah

19

64

Oshin

19

65

Sandeep Kumar

19

66

Ishant Jain

18

67

Paras Kumar

18

68

Alka Sharma

17

69

Jyoti Lamba1

17

70

Gopal Sharma

17

71

Shailja

16

72

Imran Khan

15

73

Manish Kumar Garg

15

74

Suhail Malik

15

75

Satyam

15

76

Sonal

14

77

Vikas Patel

14

78

Ajay Kumar

14

79

Akshay Sharma

14

80

Sunny Goswami

13

81

Rajesh Kumar

13

82

Rohit Kumar

13

83

Shehbaz

13

84

Jitender

13

85

Piyush Kumar

13

86

Seema

12

87

Ritik

10

88

Priyanka Yadav

1


Test Attempt After Time

Lovely Verma                31
Jeet Lal Meena              16
Kapil Dev                      11


Wednesday 3 February 2021

Difference b/w c and c++

 

What is C?

C is a structural or procedural oriented programming language which is machine-independent and extensively used in various applications.

C is the basic programming language that can be used to develop from the operating systems (like Windows) to complex programs like Oracle database, Git, Python interpreter, and many more. C programming language can be called a god's programming language as it forms the base for other programming languages. If we know the C language, then we can easily learn other programming languages. C language was developed by the great computer scientist Dennis Ritchie at the Bell Laboratories. It contains some additional features that make it unique from other programming languages.

What is C++?

C++ is a special-purpose programming language developed by Bjarne Stroustrup at Bell Labs circa 1980. C++ language is very similar to C language, and it is so compatible with C that it can run 99% of C programs without changing any source of code though C++ is an object-oriented programming language, so it is safer and well-structured programming language than C.

The following are the differences between C and C++:

  • Definition
    C is a structural programming language, and it does not support classes and objects, while C++ is an object-oriented programming language that supports the concept of classes and objects.
  • Type of programming language
    C supports the structural programming language where the code is checked line by line, while C++ is an object-oriented programming language that supports the concept of classes and objects.
  • Developer of the language
    Dennis Ritchie developed C language at Bell Laboratories while Bjarne Stroustrup developed the C++ language at Bell Labs circa 1980.
  • Subset
    C++ is a superset of C programming language. C++ can run 99% of C code but C language cannot run C++ code.
  • Type of approach
    C follows the top-down approach, while C++ follows the bottom-up approach. The top-down approach breaks the main modules into tasks; these tasks are broken into sub-tasks, and so on. The bottom-down approach develops the lower level modules first and then the next level modules.
  • Security
    In C, the data can be easily manipulated by the outsiders as it does not support the encapsulation and information hiding while C++ is a very secure language, i.e., no outsiders can manipulate its data as it supports both encapsulation and data hiding. In C language, functions and data are the free entities, and in C++ language, all the functions and data are encapsulated in the form of objects.
  • Function Overloading
    Function overloading is a feature that allows you to have more than one function with the same name but varies in the parameters. C does not support the function overloading, while C++ supports the function overloading.
  • Function Overriding
    Function overriding is a feature that provides the specific implementation to the function, which is already defined in the base class. C does not support the function overriding, while C++ supports the function overriding.
  • Reference variables
    C does not support the reference variables, while C++ supports the reference variables.
  • Keywords
    C contains 32 keywords, and C++ supports 52 keywords.
  • Namespace feature
    A namespace is a feature that groups the entities like classes, objects, and functions under some specific name. C does not contain the namespace feature, while C++ supports the namespace feature that avoids the name collisions.
  • Exception handling
    C does not provide direct support to the exception handling; it needs to use functions that support exception handling. C++ provides direct support to exception handling by using a try-catch block.
  • Input/Output functions
    In C, scanf and printf functions are used for input and output operations, respectively, while in C++, cin and cout are used for input and output operations, respectively.
  • Memory allocation and de-allocation
    C supports calloc() and malloc() functions for the memory allocation, and free() function for the memory de-allocation. C++ supports a new operator for the memory allocation and delete operator for the memory de-allocation.
  • Inheritance
    Inheritance is a feature that allows the child class to reuse the properties of the parent class. C language does not support the inheritance while C++ supports the inheritance.
  • Header file
    C program uses <stdio.h> header file while C++ program uses <iostream.h> header file.

Let's summarize the above differences in a tabular form.

No.CC++
1)C follows the procedural style programming.C++ is multi-paradigm. It supports both procedural and object oriented.
2)Data is less secured in C.In C++, you can use modifiers for class members to make it inaccessible for outside users.
3)C follows the top-down approach.C++ follows the bottom-up approach.
4)C does not support function overloading.C++ supports function overloading.
5)In C, you can't use functions in structure.In C++, you can use functions in structure.
6)C does not support reference variables.C++ supports reference variables.
7)In C, scanf() and printf() are mainly used for input/output.C++ mainly uses stream cin and cout to perform input and output operations.
8)Operator overloading is not possible in C.Operator overloading is possible in C++.
9)C programs are divided into procedures and modulesC++ programs are divided into functions and classes.
10)C does not provide the feature of namespace.C++ supports the feature of namespace.
11)Exception handling is not easy in C. It has to perform using other functions.C++ provides exception handling using Try and Catch block.
12)C does not support the inheritance.C++ supports inheritance.

Saturday 30 January 2021

Cyber Security MCQ Part - 01

 

 Cyber Security MCQ Part - 01


1.      Which of the following is not a type of virus?

a) Boot sector

b) Polymorphic

c) Multipartite

d) Trojans

2.      A computer ________ is a malicious code which self-replicates by copying itself to other programs.

a) program

b) virus

c) application

d) worm

3.      Which of them is not an ideal way of spreading the virus?

a) Infected website

b) Emails

c) Official Antivirus CDs

d) USBs

4.      In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.

a) Apple I

b) Apple II

c) Apple III

d) Apple Virus

5.      _______________ infects the master boot record and it is challenging and a complex task to remove this virus.

a) Boot Sector Virus

b) Polymorphic

c) Multipartite

d) Trojans

6.       ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.

a) Boot Sector Virus

b) Direct Action Virus

c) Polymorphic Virus

d) Multipartite Virus

7.      Direct Action Virus is also known as ___________

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

8.      ______________ infects the executables as well as the boot sectors.

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

9.      ______________ are difficult to identify as they keep on changing their type and signature.

a) Non-resident virus

b) Boot Sector Virus

c) Polymorphic Virus

d) Multipartite Virus

10.   ____________ deletes all the files that it infects.

a) Non-resident virus

b) Overwrite Virus

c) Polymorphic Virus

d) Multipartite Virus

11.   _____________ is also known as cavity virus.

a) Non-resident virus

b) Overwrite Virus

c) Polymorphic Virus

d) Space-filler Virus

12.   Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?

a) Research purpose

b) Pranks

c) Identity theft

d) Protection

13.      A ___________ is a small malicious program that runs hidden on infected system.

a) Virus

b) Trojan

c) Shareware

d) Adware

14.      ____________ works in background and steals sensitive data.

a) Virus

b) Shareware

c) Trojan

d) Adware

15.      By gaining access to the Trojaned system the attacker can stage different types of attack using that ____________ program running in the background.

a) Trojan

b) Virus

c) Antivirus

d) Anti-malware

16.      Trojan creators do not look for _______________

a) Credit card information

b) Confidential data

c) Important documents

d) Securing systems with such programs

17.      Trojans do not do one of the following. What is that?

a) Deleting Data

b) Protecting Data

c) Modifying Data

d) Copying Data

18.      Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

a) virus, cyber-criminals

b) malware, penetration testers

c) trojans, cyber-criminals

d) virus, penetration testers

19.      Trojans can not ______________

a) steal data

b) self-replicate

c) steal financial information

d) steal login credentials

20.      A _______________ provides malicious users remote control over the targeted computer.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

21.      _______________ programs are specially designed for stealing your account data for online banking systems, e-payment services & credit/debit cards.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

22.   ______________ perform automated DoS (Denial of Service) attacks on a targeted web address.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader


23____________ work in background & keeps on downloading other malicious programs when the system is online.

a) DDoS-Trojan

b) Backdoor Trojan

c) Trojan-Banker

d) Trojan-Downloader

24.      A/an ___________ is a program that steals your logins & passwords for instant messaging applications.

a) IM – Trojans

b) Backdoor Trojans

c) Trojan-Downloader

d) Ransom Trojan

25.      _____________ can modify data on your system – so that your system doesn’t run correctly or you can no longer access specific data, or it may even ask for ransom in order to give your access.

a) IM – Trojans

b) Backdoor Trojans

c) Trojan-Downloader

d) Ransom Trojan

26.      The ______________ can cost you money, by sending text messages from your mobile phone numbers.

a) IM – Trojans

b) Backdoor Trojans

c) SMS Trojan

d) Ransom Trojan

27.      A ___________ is a method in which a computer security mechanism is bypassed untraceable for accessing the computer or its information.

a) front-door

b) backdoor

c) clickjacking

d) key-logging

28.      Backdoors cannot be designed as ______________

a) the hidden part of a program

b) as a part of Trojans

c) embedded code of the firmware

d) embedded with anti-malware

29.      Backdoors are also known as ______________

a) Malware-doors

b) Trojan-backups

c) Front-doors

d) Trapdoors

30.      Which of the following is a remote Trojan?

a) Troya

b) DaCryptic

c) BankerA

d) Game-Trojan



Answer: 






 

2 - Types of Maleware

 

Worms

 A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. It is a standalone malware computer program that replicates itself

Trojan Horse 

A Trojan horse (or simply trojan) is any malware which misleads users of its true intent. It is a type of malicious code or software that looks legitimate but can take control of your computer.

 

Spam:

Spam refers to unsolicited bulk messages being sent through email, instant messaging or other digital communication tools. It is generally used by advertisers. It's a malware carrier—Some spam carries email attachments that if opened can infect your computer with viruses or spyware.

 

Spyware:

Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users. Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans; examples of other notorious types include digital rights management capabilities that "phone home", keyloggers, rootkits, and web beacons.

 

Zombie

 

A zombie is a computer connected to a network that has been compromised by a hacker, a virus or a Trojan. It can be used remotely for malicious tasks. Most owners of zombie computers do not realize that their system is being used in this way, hence the comparison with the living dead.

 

Ransomware

Ransomware is malicious software that infects your computer by encrypt the victim's information or data and displays messages demanding a fee to be paid in order for your system to work again. This class of malware is a criminal moneymaking scheme that can be installed through deceptive links in an email message, instant message or website.

 

Cryptojackers

As cryptocurrencies become more popular,  they become increasingly expensive to mine. The problem is that mining for cryptocurrency is expensive because the process requires powerful computers, which consume a large amount of electricity. To avoid this expense, dishonest individuals, known as cryptojackers, set up websites that use a visiting computer's resources such as power, processor, and memory to mine cryptocurrencies in the background, without consent.

Cryptojacking is the process of accessing a computer's resources through the website it is visiting to mine cryptocurrency without the consent or knowledge of the person using the computer.

The website hijacks the computer's power, including CPU and memory, to help it complete complex tasks which, in turn, earns the cryptojackers digital coins.

 

Adware

Adware (or advertising software) is the term used for various pop-up advertisements that show up on your computer or mobile device. Adware has the potential to become malicious and harm your device by slowing it down, hijacking your browser and installing viruses and/or spyware.


3 - List of Computer Viruses and Antiviruses

 

    

List of Computer Virus

1.       Morris Worm or the “Great Worm”

It’s believed that Morris Worm infected around 6,000 major Unix machines. Created to highlight security flaws in Unix systems, its founder Robert Morris,

2.       Nimda

Though its main target is believed to be internet Servers running Windows NT and 2000, Nimda also affected regular users’ PCs running Windows in 2001. 

3.       ILOVEYOU

Romantic as it sounds, the ILOVEYOU virus is not the kind of a gift you’d want to receive on Valentine’s Day. 

The virus used emails as a transmission channel, disguising itself as a love letter from one of its victim’s contacts. The malware was hidden in the attachment called “LOVE-LETTER-FOR-YOU.TXT.vbs”. Clicking on it activated a Visual Basic script (a programming language which allows programmers to modify code), and the worm started overwriting random files on the user’s PC.

ILOVEYOU infected over ten million Windows PCs.

 

4.       SQL Slammer

The crash of the Bank of America’s ATM service, and cancellation of several Continental Airlines flights It sparked at 05:30 UTC on January 25, 2003, infecting its first server. Once the job was done, Slammer spread rapidly, doubling the number of victims every few seconds, and just ten minutes after it was released in the wild, the number of infected computers grew to 75,000.

5.       Stuxnet

Stuxnet was developed by the US and Israeli government engineers to disrupt Iran’s nuclear program. 

 

6.       CryptoLocker

 It’s ransomware

7.       Conficker

8.       Tinba

9.       Welchia

10.   Shlayer

11.   Cyborg Ransomware

12.   GoBrut

13.   Jokeroo

14.   CryptoMix Clop Ransomware

15.   Trojan Glupteba

16.   MyDoom

17.   Storm Worm

18.   Sasser & Netsky

19.   Anna Kournikova



List of Computer Virus

 

1.       Quick Heal Total Security

2.       Norton AntiVirus Plus

3.       Avira Antivirus Pro

4.       Kaspersky Anti-Virus

5.       ESET NOD32 Antivirus

6.       Bitdefender Antivirus Plus

7.       F-Secure Antivirus SAFE

8.       Bullguard Antivirus

9.       Trend Micro Antivirus+ Security

10.   Webroot SecureAnywhere AntiVirus

11.   Panda Security Antivirus

12.   G-Data Antivirus

13.   Comodo Windows Antivirus

14.   EScan Antivirus

15.   Vipre Antivirus

16.   TrustPort Antivirus

17.   Pareto Logic Antivirus

    18.   Zone Alarm Antivirus