BS (Hons) Information Security


Warning: Undefined array key "HTTP_SEC_FETCH_SITE" in /home/shaheenl/public_html/wp-content/plugins/quiz-maker/includes/class-quiz-maker-iframe.php on line 71
7

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

___________ is an objective of network security:-

2 / 25

Identification of procedure , name is used as:-

3 / 25

_______________ Was invented by Phil Zimmermann to provide all four aspects of security in the sending email:-

4 / 25

A security manager needs to be able to regularly determine when operating system files change. What kind of tool is needed for this task:-

5 / 25

Which is the least strong security encryption standard:-

6 / 25

HTTP port number used is ____________:-

7 / 25

When we update any  tuple in the relation which authorization on a relation allows a user to:-

8 / 25

IT security in any firm is maintained by:-

9 / 25

_____________ is the hacking approach where cyber criminals design fake websites for tricking or gaining additional traffic:-

10 / 25

Aggregating suffering habits across multiple users  for advertising is an characteristics of spyware:-

11 / 25

Sign, guards, guard dogs, and visible notice are examples of:-

12 / 25

Row of table in the relational model is known as:-

13 / 25

What are the man in middle attacks:-

14 / 25

Determine the attack type that employs a fake server with a relay address:-

15 / 25

A security managers wishes all new laptops purchased by his organization to include a security cryptoprocessor. what hardware should be required:-

16 / 25

This is the forging of an e-mail header so that the message appears to have originated from someone other than actual source;-

17 / 25

Which was the first antivirus software ever created:-

18 / 25

Common biometric solutions that are suitable for building entrance control include:-

19 / 25

Which ethical hacking technique is used to determine which operating system is running on a remote computer:-

20 / 25

Implicitly to all current and future privileges that are granted users are called as:-

21 / 25

Data encryption is used to ensure confidentiality:-

22 / 25

The ___________ protocols provides message authentication, integrity and privacy:-

23 / 25

The advantage of gaseous fire suppression system is;-

24 / 25

The system where two independent pieces of data are used to identify a user is called as:-

25 / 25

Formatted statements and repeat statements is syntax was supported by;-