BS (Hons) Information Security

6

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Authentication, encryption and ACLs are example of:-

2 / 25

____________ Is the least strong security protocol:-

3 / 25

An organization has developed  new type of printer. What approach should the organization take to protect this invention:-

4 / 25

The __________ of network is assessed using the response and transit times:-

5 / 25

Which information security technology is used for avoiding browser based hacking:-

6 / 25

This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions,:-

7 / 25

Pick one method for hiding information inside a picture:-

8 / 25

What are the features of cyber security:-

9 / 25

This is the hiding of secret message within an ordinary message and the extraction of it at its destination;-

10 / 25

Which one is an advantage of anomaly detection:-

11 / 25

What is standard for exchanging authentication  information between two different security domains:-

12 / 25

In an E-R diagram is represented by:-

13 / 25

A log of all changes to the application data is called:-

14 / 25

Attributes that are included in query result which type of iterator is used:-

15 / 25

The advanced encryption standards is another name for which cipher:-

16 / 25

CHAP stands for:-

17 / 25

TCP protocols are conncetionless:-

18 / 25

_____________ is responsible for using that the database remains in consistent state despite system failure";-

19 / 25

Coaxial cables used in ________________ networks:-

20 / 25

How many class C networks can be created in a class B network:-

21 / 25

Polyalphabetic cipher is a form of one time pad:-

22 / 25

Database is structured record bas models are so named because in______________:-

23 / 25

The advantage of gaseous fire suppression system is;-

24 / 25

_____________ is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields:-

25 / 25

Grant Privileges on SQL  authorization mechanism:-