BE Information Security BS (Hons) Information Security 42 Welcome to Shaheen Leader Academy We expect 100% result. Click on Start Button. Your time is Ended. Thanks BS (Honors) Information Security Quiz 1 / 25 Tweak in XTS AES mode are non negative integers ;- True False 2 / 25 Which one is the least strong security encryption:- WPA3 WPA WPA2 WEP 3 / 25 A superincreasing Knapsack problem is ____________ to solve than a jumbled knapsack ;- Easier Tougher Shorter 4 / 25 With multiple disk , we can improve the transfer rate as well by _________ data across multiple disk :- Striping Mirroring Dividing 5 / 25 Which one is an advantage of anomaly detection:- Custom protocols can be easily analyzed The engine can scale as the rule set grows Rules are easy to define 6 / 25 How many rounds does the AES -192 perform;- 14 16 12 7 / 25 What is the seed length for AES -192 :- 384 428 320 8 / 25 Which is not a check for randomness:- Scalability None of them Uniformity 9 / 25 Compromising confidential information comes under:- Attack Threat Bug 10 / 25 There are __________ type of firewall;- 4 3 5 11 / 25 Packet filtering firewalls are deployed on ;- Routers Hubs Switches ' 12 / 25 Encryption standards that is selected by the US government to replace DES :- AES BES CES 13 / 25 In ____________ cryptography, everyone has access too everyone's public key :- Symmetric key Secret key asymmetric key 14 / 25 Which produces an output of fixed length :- PRNG PRF TRNG 15 / 25 We can also implement __________ in stateful Multilayer Inspection firewall :- Algorithm Policies External program 16 / 25 Find a number a between 0 and 9 such that a is congruent to 7 ^ 1000 mod 10 :- 3 2 1 17 / 25 In the order of group G = <720*, x > . what is the order of element 17 :- 16 4 11 18 / 25 What is the purpose of DMZ in network security :- To host public facing services To store confidential data To block incoming traffic 19 / 25 Which is opposite to the open design principle :- Least common mechanism Least privileges Security through obscurity 20 / 25 Blowfisg algorithm uses the Feistel structure ;- False True 21 / 25 Encryption of small values is made complicated by the possibility of ________;- Database attacks Minor attack Dictionary attacks 22 / 25 Carding is the method of trafficking of bank details . or other financial information over the internet :- False True 23 / 25 In SHA-3 which step function does not affect w[0,0] :- Lota Pi Theta 24 / 25 Study of creating and using encryption and decryption technique ;- Cipher Encryption Cryptography 25 / 25 In DES algorithm the round Input is __________bit :- 48 32 24 Your score is LinkedIn Facebook Twitter VKontakte Restart quiz