Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks

BS (Honors) Information Security Quiz

1 / 25

A cyber criminal tester uses the additional data that stores certain instructions in the memory for activities to break the system in which of the following attack:-

2 / 25

What is standard for exchanging authentication  information between two different security domains:-

3 / 25

This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions,:-

4 / 25

All methods are destroying data on hard disk are sufficient except;-

5 / 25

Which act violates cyber security:-

6 / 25

Process management, resource management, access management, are examples of:-

7 / 25

What is changed when cypher algorithm are used:-

8 / 25

What kind of malware does not replicate itself through infection:-

9 / 25

_____________ is responsible for using that the database remains in consistent state despite system failure";-

10 / 25

This is a mechanism for ensuring that only authorized users can use specific software application:-

11 / 25

___________ platforms are used for safety and protection of information in the cloud:-

12 / 25

Authentication, encryption and ACLs are example of:-

13 / 25

An employee in an organization is requesting access to more information than is required. This request should be denied on the basis of which principle:-

14 / 25

An attack on a website that stores and displays text to a user is known as:-

15 / 25

Who is the father of computer security::-

16 / 25

This is a series of messages sent by some one attempting to break into a computer to learn which computer network service the computer provides:-

17 / 25

What is the existence of weakness in a system is known as:-

18 / 25

____________ Is the least strong security protocol:-

19 / 25

______________ are the types of firewalls;-

20 / 25

Data security threats include:-

21 / 25

Implicitly to all current and future privileges that are granted users are called as:-

22 / 25

Which conferences was the first one for hackers:-

23 / 25

An intruder might install this on a networked computer to collect users ids and passwords from other machines on the network:-

24 / 25

The security goals are:-

25 / 25

__________ is used in cryptography during WWII:-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *