Information Security

102

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

____________ involves  scam where  an individual   lie  to  a person   to  acquire  privilege  data ;-

2 / 25

A  unique  piece of  information that is used  in encryption;-

3 / 25

Which statement is used to revoke an authorization:-

4 / 25

Benefits from disaster recovery and business continuity planning include all of the following except;-

5 / 25

The DES  algorithm  has  a key  length of ;

6 / 25

What is the minimum size  of the key in blowfish algorithm :-

7 / 25

Possible  threat   to  any   information  can not  be :-

8 / 25

HMD  is  the head mounted  display ;-

9 / 25

Trojan  creators   do  not  look  for -

10 / 25

How many basic  processes  are  there  in ethical hacking :-

11 / 25

What is the number of  possible   3 x 3  affine  cipher  transformation:-

12 / 25

MACs  are  also called :-

13 / 25

The  purpose of tweak  in XTS-AES mode  is   to   :-

14 / 25

A  planned  program  if  work  that  requires  a  definitive  amount of time ,  effort and planning  to complete :-

15 / 25

What is  the Discrete  logarithm to the base 2 (mod 19)  for a =  7 :-

16 / 25

Block  ciphers  use  more code   than stream ciphers :-

17 / 25

In SSL   what is  used  for  authenticating   a  message :-

18 / 25

The sum of  polynomials   of  degrees  m and  n  has   degree  max [ m,n] :-

19 / 25

In SHA-3  which step  function does not affect  w[0,0] :-

20 / 25

The property that any  extracted  subsequence  should pass the test  for  randomness is -

21 / 25

_________ means concealing the content of a message by enciphering:-

22 / 25

Which  is  not  a  steganography  tool ;-

23 / 25

The  flash memory  storage   used  are ;-

24 / 25

A packet   filter  firewall  filters   at the  __________ layer ;-

25 / 25

Which one is considered in the category of computer threat:-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *