BE Information Security

BS (Hons) Information Security

45

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Which of these is  a part of  network  identification;-

2 / 25

Firewall is a device placed at an organization's perimeter to prevent unwanted access:-

3 / 25

Find the solution  of x2 = 15 mod 23 has a solution;-

4 / 25

Which  protocols   is  widely  used  in wifi  security ;-

5 / 25

In  the  _________ mode, the IPSec  header  is  added   between the IP  header  and  the rest  of the packet :

6 / 25

This electronic 'credit card' establishes a user's credentials when doing business on the web:-

7 / 25

Data  masking  is  also known as :-

8 / 25

Digital signature  does not  provide :-

9 / 25

Compromising  confidential   information  comes  under ;-

10 / 25

Where  performance and reliability   are both important, RAID level  ________ is used :-

11 / 25

gcd (18,300) =  :-

12 / 25

Possible  threat   to  any   information  can not  be :-

13 / 25

Information  privacy ,,  Individual privacy   and  communication privacy  is  the three   main pillars  of  ;-

14 / 25

Which one is not a cyber crime:-

15 / 25

_________ is  an attempt  to  steal  , spy,   network or their   associated   information;-

16 / 25

Application level  gateway   firewalls  protect  the  network  for specific   application layer protocol:-

17 / 25

A  cipher in which  the order  is not  preserved  :-

18 / 25

_________  often  does  damage  like  deleting  and  corrupting  files  and data ;-

19 / 25

Φ(21)= :-

20 / 25

Multiple   string  are used  tp  encode   the  plain text ;-

21 / 25

_____________ is  a  step  in  which  design  is  translated  into machine  readable   form ;-

22 / 25

A  typical tape  drive  is  a  ______________ typical  disk drive :-

23 / 25

What does EDR stands for:-

24 / 25

Frequency test determines   whether the number of  ones and zeros in a sequence is approx the   same as  in a   truely  random o/p-

25 / 25

A packet   filter  firewall  filters   at the  __________ layer ;-