BS (Hons) Information Security


Warning: Undefined array key "HTTP_SEC_FETCH_SITE" in /home/shaheenl/public_html/wp-content/plugins/quiz-maker/includes/class-quiz-maker-iframe.php on line 71
26

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Blowfish  encrypt  blocks  of plaintext  which have size :-

2 / 25

Which one  is  most  used  rule for  backup ;-

3 / 25

How  many numbers  can not   be  used in GF(p) in 2 n where  n= 4 :-

4 / 25

This is an encryption / decryption key known only to the party that exchange secret messages:-

5 / 25

Which step  function  works  only  W[0,0]  :-

6 / 25

Maltego  is used   for  reconnaissance purpose only :-

7 / 25

The number of  unique substitution  boxes  in DES  after  the  48 bit XOR  operation are :-

8 / 25

ANSI   x9.17  used  a seed of  size :-

9 / 25

Which is  the port number for  SSH ;-

10 / 25

How many  round  keys  are generated   in the AES algorithm:-

11 / 25

A  person who  enjoys   learning  details  about  computers  and  how  to enhance their capabilities ;-

12 / 25

Study of  creating   and  using  encryption and  decryption technique ;-

13 / 25

Smart  glasses  are also called  as   optical  head mounted display :-

14 / 25

_____________ ensures  that integrity  and  security  of  data that  are  passing  over a  network :-

15 / 25

Which of these is  a part of  network  identification;-

16 / 25

Which is  not  done  in gaining   access  phase ;-

17 / 25

The advantage of gaseous fire suppression system is;-

18 / 25

Which  is  a  physical  storage   media :-

19 / 25

CTR  mode is  more prone   than  the OBF  mode :-

20 / 25

Which  is  a  component  of data  privacy :-

21 / 25

Maltego  is  not  a  footprint  scanning  tool ;-

22 / 25

A program in which harmful code is contained inside the apparent harmless programming or data:-

23 / 25

What are the man in middle attacks:-

24 / 25

How many  rounds  are present   in each iteration  function of SHA-3 :-

25 / 25

Which is  not  an objective  of  Network security ;-