BS (Hons) Information Security 0 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) Information Security Quiz 1 / 25 Which is not a form of scanning:- SYN stealth Cloud scan Null scan Xmas Tree scan 2 / 25 In RSA , if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of:- the network User A User B 3 / 25 ___________ DDoS in mobile system wait for the owner to trigger the cyber attack:- Botnets Virus Programs 4 / 25 Who is the father of computer security::- Bob Thomas Robert August Kerckhoffs 5 / 25 What are phishing attacks:- Users are fooled by the similar GUI and data is extracted from them Users are forced to use a second server which causes the attack None Both 6 / 25 Which describes the different forms of gathering:- All of them Vulnerability Port scanning Network 7 / 25 Relation in relational model to refer to a specific instance of a term used is known as:- Relation attribute Relation instances'' Relation entity 8 / 25 This is a mode of operation for a block cipher;- Electronic code book Foot printing Hash function 9 / 25 Sign, guards, guard dogs, and visible notice are examples of:- Preventive control Deterrent control Administrative control 10 / 25 This is the forging of an e-mail header so that the message appears to have originated from someone other than actual source;- E mail spoofing Non repudiation Foot printing 11 / 25 Which is a valid encryption technique;- Parallel key encryption Systematic key encryption Public key encryption 12 / 25 Which one is an advantage of anomaly detection:- Rules are easy to define Custom protocols can be easily analyzed The engine can scale as the rule set grows 13 / 25 They are nefarious hackers , and their main motive is to gain financial profit by doing cyber crimes:- Black hat hackers White hat hackers Gray hat hackers 14 / 25 A false positive is an alert that indicates nefarious activity on a system that is not running on the network:- True False 15 / 25 The ___________ protocols provides message authentication, integrity and privacy:- AH ESP SPE 16 / 25 Which one is considered in the category of computer threat:- DoS attack Phishing Soliciting 17 / 25 Determine the attack type that employs a fake server with a relay address:- NTLM MITM SMB NetBIOS 18 / 25 The URL of the page that had the link that the user clicked to access the page is called as:- Source Leakers Referrer Linker 19 / 25 In which of the following exploits does an attacker insert mallicious coding into a link that appears to be from a trustworthy source:- Cross site scription Buffer overflow Command injection 20 / 25 Polyalphabetic cipher is a form of one time pad:- True False 21 / 25 The advantage of gaseous fire suppression system is;- It works by displacing oxygen in the room It will not damage computing equipment Both a, b 22 / 25 Which act violates cyber security:- Exploit Attack Threat 23 / 25 Determine the number of characters the Linux OS will allow in file names:- 32 64 256 128 24 / 25 Which of the following is a private search engine:- Bing Google Yahoo Duckduckgo 25 / 25 True dependencies generated in reflexive rule , are classified as:- Nontrivial Functional Inferential Trivial Your score is LinkedIn Facebook Twitter VKontakte Restart quiz