BS (Hons) Information Security Warning: Undefined array key "HTTP_SEC_FETCH_SITE" in /home/shaheenl/public_html/wp-content/plugins/quiz-maker/includes/class-quiz-maker-iframe.php on line 71 26 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) Information Security Quiz 1 / 25 Blowfish encrypt blocks of plaintext which have size :- 72 bits 64 bits 256 bits 2 / 25 Which one is most used rule for backup ;- 4-2-1 rule 4-3-2 rule 3-2-1 rule 3 / 25 How many numbers can not  be used in GF(p) in 2 n where n= 4 :- 3 5 2 4 / 25 This is an encryption / decryption key known only to the party that exchange secret messages:- E-signature Digital certificates Private keys 5 / 25 Which step function works only W[0,0] :- Theta Pi Lota 6 / 25 Maltego is used  for reconnaissance purpose only :- True False 7 / 25 The number of unique substitution boxes in DES after the 48 bit XOR operation are :- 8 5 6 8 / 25 ANSI  x9.17 used a seed of size :- 32 bits 64 bits 56 bits 9 / 25 Which is the port number for SSH ;- 20 22 21 10 / 25 How many round keys are generated  in the AES algorithm:- 11 10 12 11 / 25 A person who enjoys  learning details about computers and how to enhance their capabilities ;- App controller Hacker Cracker 12 / 25 Study of creating  and using encryption and decryption technique ;- Cipher Encryption Cryptography 13 / 25 Smart glasses are also called as  optical head mounted display :- False True 14 / 25 _____________ ensures that integrity and security of data that are passing over a network :- Antivirus Firewall Network security protocols 15 / 25 Which of these is a part of network identification;- password User ID OTP 16 / 25 Which is not done in gaining  access phase ;- Buffer overflow Tunneling Session hijacking 17 / 25 The advantage of gaseous fire suppression system is;- Both a, b It works by displacing oxygen in the room It will not damage computing equipment 18 / 25 Which is a physical storage  media :- Tape storage Optical storage all of them 19 / 25 CTR mode is more prone  than the OBF mode :- True False 20 / 25 Which is a component of data privacy :- Management of data risk all of them Data loss prevention 21 / 25 Maltego is not a footprint scanning tool ;- False True 22 / 25 A program in which harmful code is contained inside the apparent harmless programming or data:- Snort Honeypot Torjan Horse 23 / 25 What are the man in middle attacks:- Users are forced to divert a site where the attack take place None Both Users are forced to use a second server which causes the attack 24 / 25 How many rounds are present  in each iteration function of SHA-3 :- 5 3 4 25 / 25 Which is not an objective of Network security ;- Authentication Identification Access control Your score is LinkedIn Facebook Twitter VKontakte Restart quiz