Information Security

45

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Data security threats include:-

2 / 25

A false positive is an alert that indicates nefarious activity on a system that is not running on the network:-

3 / 25

Which has the lowest  bitrate :-

4 / 25

_____________ is responsible for using that the database remains in consistent state despite system failure";-

5 / 25

_________ is  the  way   through  which majority  of  the malware   gets  installed  in our  system :-

6 / 25

Masquerading   is  pretending   to be  an   authorized  user :-

7 / 25

Data encryption is used to ensure confidentiality:-

8 / 25

The  encryption technique   in computer networks   are used  for  improving  the ________;-

9 / 25

What is  expanded key size  of   AES-192 :-

10 / 25

Which  is  a  private  search engine :-

11 / 25

TRNGs  take   in an input  which is referred  to as ;-

12 / 25

In the  DES  algorithm  round  input   is  expanded  to  48  bits  via :-

13 / 25

MACs  are  also called :-

14 / 25

_________ means  that the  sender  and  the receiver   expect  confidentiality ;-

15 / 25

Common biometric solutions that are suitable for building entrance control include:-

16 / 25

A__________ is  tested   to ensure  that information   properly flows   into  an   out  of  system;-

17 / 25

What is the existence of weakness in a system is known as:-

18 / 25

The  group G =  < Zp* ,x>  is always  cyclic :-

19 / 25

PRNGs   take in an  input which is referred  to as :-

20 / 25

Attributes that are included in query result which type of iterator is used:-

21 / 25

Which security measures  is used to  prevent   unauthorized  access  to  physical areas :-

22 / 25

The _______________ protocol provides message authentication and integrity , but not privacy:-

23 / 25

An attack  that intercepts   communication between   two parties  is  called  man  in the middle  attack :-

24 / 25

The S box   value for  byte  stored in cell 3,3 :-

25 / 25

Which  is  not  a  steganography  tool ;-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *