BE Information Security

BS (Hons) Information Security

102

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Which is not an email related hacking tool:-

2 / 25

Application  layer firewall  are also  called  :-

3 / 25

Grant Privileges on SQL  authorization mechanism:-

4 / 25

Cryptography  can be  divided   into  __________ types :-

5 / 25

Firewalls  are  to  protect  against unauthorized  attacks ;-

6 / 25

_____________ is responsible for using that the database remains in consistent state despite system failure";-

7 / 25

For  the NIST CTR DRBG  seed  length = :-

8 / 25

How many rounds  does the  AES  -256 perform :-

9 / 25

XTS AES  mode  of  operation  is  a better  version of ;-

10 / 25

A  type  of  cipher text   that uses  multiple  alphabetic   string :-

11 / 25

Which ethical hacking technique is used to determine which operating system is running on a remote computer:-

12 / 25

The  simplest  AES   has only  2   rounds  of  computation:-

13 / 25

There   are  ___________ major  types  of  ports   in computer ;-

14 / 25

Which one  is  interacting   with network  intrusion  detection and real  time  traffic  analysis ;-

15 / 25

___________ platforms are used for safety and protection of information in the cloud:-

16 / 25

Which is not a type of peer - peer cyber crime:-

17 / 25

Pretty Goof  Privacy  used  which PRNG :-

18 / 25

Which type of attack  involves   sending  malicious   code embedded  in a  seemingly  harmless file ::-

19 / 25

Which hacking  tool    do not  use  for  maintaining   access  in  a  system :-

20 / 25

When you book  online  tickets   by  swiping   your  card ,   the  details  of   the card  gets  stored  in :-

21 / 25

A process  of  removing   personal   identifiers  from  data  is pseudonymization;-

22 / 25

An attack on computer system that take advantage of a particular vulnerability that the system offers to intruders:-

23 / 25

The most obvious places to put an IDS sensor is near the firewall. where exactly in a relation to the firewall is the most productive placement:-

24 / 25

Which tool is  used  for Wi Fi hacking :-

25 / 25

This is a peripheral component interconnect card that offloads SSL processing to speed up secure transactions on e-commerce Web sites;-