BE Information Security BS (Hons) Information Security 102 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) Information Security Quiz 1 / 25 ___________ can not be used in the case of stream cipher;- TRNGs PRF PRNGs 2 / 25 The first computer  virus is ;- Creeper HARLE The Famous 3 / 25 Which is the example of  PII information:- A full name A Physical address Both of them 4 / 25 Which step function provides most amount of diffusion for the Keccak iteration step :- Pi Rho Theta 5 / 25 A laser is requires to  record a hologram ;- False True 6 / 25 If a | b and b| c , then a | c :- True False 7 / 25 The _____________ was designed to provide  security at the transport layer ;- TLS AH ESP 8 / 25 Who is the father of computer security::- August Kerckhoffs Bob Thomas Robert 9 / 25 In which cases session initiation protocol is not used ;- Instant messaging Data transferring Voice over LTE 10 / 25 PRNGs are derived through algorithm :- False True 11 / 25 Lack of access control policy is :- Threat Bug Vulnerability 12 / 25 Point of sale intrusion does not  deal with financial details  and credits card information;- True False 13 / 25 Adware are  Pre chosen _______ developed  display ads :- Malware Banner Software 14 / 25 File transfer , email use stream ciphers :- True False 15 / 25 ____________ technology is used for analyzing monitoring traffic in network and information flow:- Managed detection and response Cloud access security brokers Network traffic analysis 16 / 25 Choose the phrase from the list below that best describes the initial stage of ethical hacking:- DNS poisoning ARP poisoning Footprinting 17 / 25 Which mode is recommended for  the X9.82 Random Number generator ;- CFB CBC OFB 18 / 25 Which is a type of cyber attacks;- Phishing SQL injections password attacks all of them 19 / 25 _________ are tools used for scanning foot print :- Both of them TcpView Superscan 20 / 25 gcd (18,300) = :- 4 12 8 6 21 / 25 Row of table in the relational model is known as:- Attribution Tuple Relation 22 / 25 What is used for database security:- finger point Data encryption a view all of them 23 / 25 OPAD is 5c in hexadecimal :- False True 24 / 25 Information that directly  or indirectly  links to a  person is considered  as :- IIP PII PIII 25 / 25 Select the popular IP address  and  Port scanner ;- Snort Angry IP scanner Ettercap Your score is LinkedIn Facebook Twitter VKontakte Restart quiz