Warning: Undefined array key "HTTP_SEC_FETCH_SITE" in /home/shaheenl/public_html/wp-content/plugins/quiz-maker/includes/class-quiz-maker-iframe.php on line 71
7

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Determine the attack type that employs a fake server with a relay address:-

2 / 25

A security manager needs to be able to regularly determine when operating system files change. What kind of tool is needed for this task:-

3 / 25

Which attack is threatening availability:-

4 / 25

Public key cryptography is so named because it uses an encryption key that can be released to the public:-

5 / 25

Which attack is threading integrity:-

6 / 25

True dependencies generated in reflexive rule , are classified as:-

7 / 25

In Database design data model that is widely used is:-

8 / 25

An organization has been made a party in a civil lawsuit. The organization is required to search its electronic records for specific memoranda. This process is known as:-

9 / 25

Which is a component of cyber security:-

10 / 25

This is the inclusion of set message in otherwise unencryption text orimages:-

11 / 25

Specialization of relationship known as:-

12 / 25

What layer of an email message should you consider when evaluating e- mail security:-

13 / 25

Aggregating suffering habits across multiple users  for advertising is an characteristics of spyware:-

14 / 25

Which is an internet scam done by cyber criminals where the user is convinced digitally to provide confidential information:-

15 / 25

___________ platforms are used for safety and protection of information in the cloud:-

16 / 25

_______________ can provide authentication , integrity and nonrepudiation for a message:-

17 / 25

What does PCT stands for:-

18 / 25

Rootkit can be difficult to detect because:-

19 / 25

Which one is a type of cyber security:

20 / 25

____________ Is an electronic paper used to track computer activity:-

21 / 25

_____________ is responsible for using that the database remains in consistent state despite system failure";-

22 / 25

___________ is not a threat to information security:-

23 / 25

This technology leads to measure and analyze human body characteristics for authentication purposes:-

24 / 25

Lack of access control policy is a:-

25 / 25

The system where two independent pieces of data are used to identify a user is called as:-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *