BS (Hons) Information Security 6 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) Information Security Quiz 1 / 25 Authentication, encryption and ACLs are example of:- Defense in depth Defective control Technical controls Administrative controls 2 / 25 ____________ Is the least strong security protocol:- SFTP SMTP SSL 3 / 25 An organization has developed new type of printer. What approach should the organization take to protect this invention:- Patent Trade secret Copyright 4 / 25 The __________ of network is assessed using the response and transit times:- Longevity Performance Reliability 5 / 25 Which information security technology is used for avoiding browser based hacking:- Anti-malware in browser aware remover in browser Remote browser access 6 / 25 This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions,:- Block cipher War dialing Buffer overflow 7 / 25 Pick one method for hiding information inside a picture:- Rootkits Image Rendering Steganography 8 / 25 What are the features of cyber security:- Threat prevention Defense against internal threats All of them Compliance 9 / 25 This is the hiding of secret message within an ordinary message and the extraction of it at its destination;- Message queuing Steganography Secret key algorithm Spyware 10 / 25 Which one is an advantage of anomaly detection:- Rules are easy to define The engine can scale as the rule set grows Custom protocols can be easily analyzed 11 / 25 What is standard for exchanging authentication information between two different security domains:- SPTA SABM SAML STML 12 / 25 In an E-R diagram is represented by:- Dashed arrow head Hollow arrow head Double arrow head 13 / 25 A log of all changes to the application data is called:- Audit lead Audit log Audit trail 14 / 25 Attributes that are included in query result which type of iterator is used:- non positioned iterator Positional iterator named iterator Unnamed iterator 15 / 25 The advanced encryption standards is another name for which cipher:- 3DES Digital Encryption Algorithm Rijndael 16 / 25 CHAP stands for:- Circuit Hardware Authentication Protocols Challenge Handshake Authentication Protocols Circuit Handshake Authentication Protocols 17 / 25 TCP protocols are conncetionless:- True False 18 / 25 _____________ is responsible for using that the database remains in consistent state despite system failure";- Storage manager End user Transaction manager 19 / 25 Coaxial cables used in ________________ networks:- Telephone Cable TV Both a, b 20 / 25 How many class C networks can be created in a class B network:- 254 1024 535 21 / 25 Polyalphabetic cipher is a form of one time pad:- False True 22 / 25 Database is structured record bas models are so named because in______________:- Fixe format records Random format record Variable format records 23 / 25 The advantage of gaseous fire suppression system is;- It works by displacing oxygen in the room It will not damage computing equipment Both a, b 24 / 25 _____________ is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields:- Van Eck phreaking Electronic data processing Reverse engineering 25 / 25 Grant Privileges on SQL authorization mechanism:- Specified tuples Specified attributes Entire relation Both a, b Your score is LinkedIn Facebook Twitter VKontakte Restart quiz