BE Information Security

BS (Hons) Information Security

49

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

A  planned  program  if  work  that  requires  a  definitive  amount of time ,  effort and planning  to complete :-

2 / 25

Which  store   several  gigabytes   of  data  but  usually lost   when power  failure :-

3 / 25

TCP protocols are conncetionless:-

4 / 25

For  the NIST CTR DRBG  seed  length = :-

5 / 25

In  the  _________ mode, the IPSec  header  is  added   between the IP  header  and  the rest  of the packet :

6 / 25

The  absence   of  a  fire   suppression   system  would  be   best  characterized  as :-

7 / 25

Which one is not a cyber crime:-

8 / 25

What does IDS  stand  for  in Network  security ;-

9 / 25

P15  gets  XORed with ;-

10 / 25

________ is not vulnerability to information security:-

11 / 25

A  concern  of   authentication  that deals  with  user right ;-

12 / 25

Coaxial cables used in ________________ networks:-

13 / 25

_________ are  a  specific   section  of  any  virus   that  perform illicit  activities   in a  system  

14 / 25

Point of  sale  intrusion  does  not   deal with financial  details   and  credits card information;-

 

15 / 25

Which antivirus  is  harmful  to the  computer :-

16 / 25

Application level  gateway   firewalls  protect  the  network  for specific   application layer protocol:-

17 / 25

What is standard for exchanging authentication  information between two different security domains:-

18 / 25

In  public  key  cryptography,  a  key that  decrypts   the message :-

19 / 25

_________ Is  a  set of  conventions  and  rules set for communicating  two or more   devices   residing in the same network ;-

20 / 25

ACL  stands  for ;-

21 / 25

SRTP   protocol  is  used  in  entertainment  system  and  streaming   media  and  sites :-

22 / 25

Abbreviation of PMS language constructs for procedure is:-

23 / 25

A packet filter firewall filters at the ______________ or ___________ layer:-

24 / 25

Abstraction combines   the  data  and  functions   into  a  single   unit  called  a  class :-

25 / 25

After  a  message  is  encrypted   ,  it is called  __________;-