BE Information Security

BS (Hons) Information Security

102

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

___________ can not be used  in the case of stream cipher;-

2 / 25

The  first  computer   virus  is  ;-

3 / 25

Which is  the  example  of   PII  information:-

4 / 25

Which  step function provides  most amount of  diffusion for the Keccak  iteration step :-

5 / 25

A laser  is  requires  to   record  a  hologram ;-

6 / 25

If  a | b  and b| c  , then a | c :-

7 / 25

The  _____________ was  designed  to  provide   security  at the transport layer ;-

8 / 25

Who is the father of computer security::-

9 / 25

In which cases session  initiation protocol  is  not  used ;-

10 / 25

PRNGs  are derived  through algorithm :-

11 / 25

Lack of  access  control  policy is :-

12 / 25

Point of  sale  intrusion  does  not   deal with financial  details   and  credits card information;-

 

13 / 25

Adware  are   Pre chosen  _______ developed   display  ads :-

14 / 25

File  transfer ,  email  use  stream  ciphers :-

15 / 25

____________ technology is used for analyzing monitoring traffic in network and information flow:-

16 / 25

Choose the phrase from  the list below that best describes the initial stage of ethical hacking:-

17 / 25

Which mode  is recommended for   the X9.82  Random  Number  generator ;-

18 / 25

Which is a type of cyber attacks;-

19 / 25

_________ are tools used  for  scanning  foot print :-

20 / 25

gcd (18,300) =  :-

21 / 25

Row of table in the relational model is known as:-

22 / 25

What is used for database security:-

23 / 25

OPAD  is  5c  in hexadecimal :-

24 / 25

Information that directly   or  indirectly   links  to a   person  is  considered   as :-

25 / 25

Select the popular  IP  address   and   Port scanner ;-