BS (Hons) Information Security

0

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Which is not a form of scanning:-

2 / 25

In RSA , if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of:-

3 / 25

___________ DDoS in mobile system wait for the owner to trigger the cyber attack:-

4 / 25

Who is the father of computer security::-

5 / 25

What are phishing attacks:-

6 / 25

Which describes the different forms of gathering:-

7 / 25

Relation in relational model to refer to a specific instance of a term used is known as:-

8 / 25

This is a mode of operation for a block cipher;-

9 / 25

Sign, guards, guard dogs, and visible notice are examples of:-

10 / 25

This is the forging of an e-mail header so that the message appears to have originated from someone other than actual source;-

11 / 25

Which is a valid encryption technique;-

12 / 25

Which one is an advantage of anomaly detection:-

13 / 25

They are nefarious hackers , and their main motive is to gain financial profit by doing cyber  crimes:-

14 / 25

A false positive is an alert that indicates nefarious activity on a system that is not running on the network:-

15 / 25

The ___________ protocols provides message authentication, integrity and privacy:-

16 / 25

Which one is considered in the category of computer threat:-

17 / 25

Determine the attack type that employs a fake server with a relay address:-

18 / 25

The URL of the page that had the link that the user clicked to access the page is called as:-

19 / 25

In which of the following exploits does an attacker insert mallicious coding into a link that appears to be from a trustworthy source:-

20 / 25

Polyalphabetic cipher is a form of one time pad:-

21 / 25

The advantage of gaseous fire suppression system is;-

22 / 25

Which act violates cyber security:-

23 / 25

Determine the number of characters the Linux OS will allow in file names:-

24 / 25

Which of the following is a private search engine:-

25 / 25

True dependencies generated in reflexive rule , are classified as:-