BE Information Security BS (Hons) Information Security 49 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) Information Security Quiz 1 / 25 A planned program if work that requires a definitive amount of time , effort and planning to complete :- Problem Project Process 2 / 25 Which store  several gigabytes  of data but usually lost  when power failure :- Disk Main memory Flash memory 3 / 25 TCP protocols are conncetionless:- True False 4 / 25 For the NIST CTR DRBG seed length = :- Output Block length Output Block length + key length Raseed Interval 5 / 25 In the _________ mode, the IPSec header is added  between the IP header and the rest of the packet : Transport Tunnel Transition 6 / 25 The absence  of a fire  suppression  system would be  best characterized as :- Vulnerability Exposure Threat 7 / 25 Which one is not a cyber crime:- AES Man in the middle Malware Denial of service 8 / 25 What does IDS stand for in Network security ;- Intrusion Detection system Information Data system Internet Data server 9 / 25 P15 gets XORed with ;- k3 k14 k1 10 / 25 ________ is not vulnerability to information security:- Flood Unchanged default password latest patches 11 / 25 A concern of  authentication that deals with user right ;- Functional Authorization Functional authentication General access 12 / 25 Coaxial cables used in ________________ networks:- Both a, b Cable TV Telephone 13 / 25 _________ are a specific  section of any virus  that perform illicit activities  in a system  Spyware Worms Payload 14 / 25 Point of sale intrusion does not  deal with financial details  and credits card information;- False True 15 / 25 Which antivirus is harmful to the computer :- Virus Antivirus Shareware 16 / 25 Application level gateway  firewalls protect the network for specific  application layer protocol:- True False 17 / 25 What is standard for exchanging authentication information between two different security domains:- SAML SABM SPTA STML 18 / 25 In public key cryptography, a key that decrypts  the message :- Private key Unique key Public key 19 / 25 _________ Is a set of conventions and rules set for communicating two or more  devices  residing in the same network ;- Security policies Protocols Wireless network 20 / 25 ACL stands for ;- Access control List Anti control list access Condition list 21 / 25 SRTP  protocol is used in entertainment system and streaming  media and sites :- False True 22 / 25 Abbreviation of PMS language constructs for procedure is:- Prepared storage Module Persistent storage Module Permanent storage Module 23 / 25 A packet filter firewall filters at the ______________ or ___________ layer:- network, application transport, application network, transport 24 / 25 Abstraction combines  the data and functions  into a single  unit called a class :- True False 25 / 25 After a message is encrypted  , it is called __________;- Plaintext Cryptotext Ciphertext Your score is LinkedIn Facebook Twitter VKontakte Restart quiz