BE Information Security BS (Hons) Information Security 45 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) Information Security Quiz 1 / 25 Which of these is a part of network identification;- OTP password User ID 2 / 25 Firewall is a device placed at an organization's perimeter to prevent unwanted access:- True False 3 / 25 Find the solution of x2 = 15 mod 23 has a solution;- False True 4 / 25 Which protocols is widely used in wifi security ;- WPA WPS WPA2 5 / 25 In the _________ mode, the IPSec header is added between the IP header and the rest of the packet : Tunnel Transport Transition 6 / 25 This electronic 'credit card' establishes a user's credentials when doing business on the web:- Ownership tags Smart cards Digital certificates Private key 7 / 25 Data masking is also known as :- Data copying Data breaching Data obfuscation 8 / 25 Digital signature does not provide :- Privacy Nonrepudiation Authentication 9 / 25 Compromising confidential information comes under ;- Threat Bug Attack 10 / 25 Where performance and reliability are both important, RAID level ________ is used :- 1 0 0+1 11 / 25 gcd (18,300) = :- 8 6 12 4 12 / 25 Possible threat to any information can not be :- Transferee Protected Ignored 13 / 25 Information privacy ,, Individual privacy and communication privacy is the three main pillars of ;- Digital protection Digital integrity Digital privacy 14 / 25 Which one is not a cyber crime:- Malware AES Denial of service Man in the middle 15 / 25 _________ is an attempt to steal , spy, network or their associated information;- Cyber attack Digital hacking Cyber security 16 / 25 Application level gateway firewalls protect the network for specific application layer protocol:- False True 17 / 25 A cipher in which the order is not preserved :- Public key based Transposition based Substitution based 18 / 25 _________ often does damage like deleting and corrupting files and data ;- Virus Worm Trojan 19 / 25 Φ(21)= :- 12 14 10 20 / 25 Multiple string are used tp encode the plain text ;- False True 21 / 25 _____________ is a step in which design is translated into machine readable form ;- Conversion Design Coding 22 / 25 A typical tape drive is a ______________ typical disk drive :- of the same cost as Cheaper than More expensive than 23 / 25 What does EDR stands for:- Endless Detection and Recovery Endless Detection and Response Endpoint Detection and Response 24 / 25 Frequency test determines whether the number of ones and zeros in a sequence is approx the same as in a truely random o/p- False True 25 / 25 A packet filter firewall filters at the __________ layer ;- Application Network Both of them Your score is LinkedIn Facebook Twitter VKontakte Restart quiz