BE Information Security BS (Hons) Information Security 102 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) Information Security Quiz 1 / 25 Which is not an email related hacking tool:- Sendinc Email Frinder Pro Mail password 2 / 25 Application layer firewall are also called :- Second generation firewall First generation firewall Third generation firewall 3 / 25 Grant Privileges on SQL authorization mechanism:- Entire relation Specified tuples Both a, b Specified attributes 4 / 25 Cryptography can be divided  into __________ types :- 7 2 5 5 / 25 Firewalls are to protect against unauthorized attacks ;- False True 6 / 25 _____________ is responsible for using that the database remains in consistent state despite system failure";- End user Transaction manager Storage manager 7 / 25 For the NIST CTR DRBG seed length = :- Output Block length + key length Raseed Interval Output Block length 8 / 25 How many rounds does the AES -256 perform :- 14 12 10 9 / 25 XTS AES mode of operation is a better version of ;- CFB ECB OFB 10 / 25 A type of cipher text  that uses multiple alphabetic  string :- Polyalphabetic Substitution based Transposition based Substitution based 11 / 25 Which ethical hacking technique is used to determine which operating system is running on a remote computer:- Operating system penetration testing Digital printing Operating system fingerprinting 12 / 25 The simplest AES  has only 2  rounds of computation:- False True 13 / 25 There  are ___________ major types of ports  in computer ;- 3 1 2 14 / 25 Which one is interacting  with network intrusion detection and real time traffic analysis ;- None of them Snort Nessus 15 / 25 ___________ platforms are used for safety and protection of information in the cloud:- One drive AWS Cloud workload protection platform 16 / 25 Which is not a type of peer - peer cyber crime:- Credit card details leak in the deep web MITM injecting Trojans to a target victim 17 / 25 Pretty Goof Privacy used which PRNG :- RFC 4086 ANSI X9.82 ANSI X9.17 18 / 25 Which type of attack involves  sending malicious  code embedded in a seemingly harmless file ::- Malware Spyware Phishing 19 / 25 Which hacking tool  do not use for maintaining  access in a system :- Wireshark Rootkits Backdoors 20 / 25 When you book online tickets  by swiping  your card ,  the details of  the card gets stored in :- Database system Servers Point of sale system 21 / 25 A process of removing  personal  identifiers from data is pseudonymization;- False True 22 / 25 An attack on computer system that take advantage of a particular vulnerability that the system offers to intruders:- Port scan Logic bomb Exploit 23 / 25 The most obvious places to put an IDS sensor is near the firewall. where exactly in a relation to the firewall is the most productive placement:- None Outside the firewall Both Inside the firewall 24 / 25 Which tool is used for Wi Fi hacking :- Wireshark Snort Nessus 25 / 25 This is a peripheral component interconnect card that offloads SSL processing to speed up secure transactions on e-commerce Web sites;- Server accelerator card PCMCIA card Smart card Your score is LinkedIn Facebook Twitter VKontakte Restart quiz