BS (Hons) Information Security

6

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Primary data model is relational model in today for commercial  _______________:-

2 / 25

They are malicious whose primary goal is to commit cybercrimes to make money. Who are 'they' in this context:-

3 / 25

Determine the attack type that employs a fake server with a relay address:-

4 / 25

___________ platforms are used for safety and protection of information in the cloud:-

5 / 25

The best defense against a NOP sled attack is:-

6 / 25

An employee in an organization is requesting access to more information than is required. This request should be denied on the basis of which principle:-

7 / 25

_______________ Was invented by Phil Zimmermann to provide all four aspects of security in the sending email:-

8 / 25

A ________ is a trusted third party that solves the problem of symmetric key distribution:-

9 / 25

Where did the term ' hacker' priginates:-

10 / 25

Aggregating suffering habits across multiple users  for advertising is an characteristics of spyware:-

11 / 25

A source code review uncovered the existence of instructions that permit the user to bypass security control. What was discovered in the code review:-

12 / 25

IPSec requires a logical connection between two hosts using a signaling protocol called____________:-

13 / 25

What layer of an email message should you consider when evaluating e- mail security:-

14 / 25

This is the hiding of secret message within an ordinary message and the extraction of it at its destination;-

15 / 25

_____________ is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields:-

16 / 25

A program in which harmful code is contained inside the apparent harmless programming or data:-

17 / 25

In which of the following exploits does an attacker insert mallicious coding into a link that appears to be from a trustworthy source:-

18 / 25

What is the purpose of using  a proxy server for a hackers;-

19 / 25

This technology leads to measure and analyze human body characteristics for authentication purposes:-

20 / 25

The RSA algorithm for confidentiality uses _________________ cryptography:-

21 / 25

What is standard for exchanging authentication  information between two different security domains:-

22 / 25

IPSec operates at two different modes, ______________ modes and _________________ mode:-

23 / 25

Determine the number of characters the Linux OS will allow in file names:-

24 / 25

Which was the first antivirus software ever created:-

25 / 25

Which statement best describes how the principle would be broken if a computer was no longer accessible:-