Information Security

102

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

What is  the  value of OPAD  in  HMAC    structure -

2 / 25

Like DES, AES  also  uses  Feistel structure ;-

3 / 25

VPN technology uses two simultaneous techniques to guarantee privacy for an organization _________ and _________________:-

4 / 25

__________ is  the tool   used  for  this  purpose :-

5 / 25

One  advantage  of  stateful  Multilayer  inspection firewall is ___________:-

6 / 25

How many bit  position  are active and  can affect L[0 , 0]  in the lota step function;-

7 / 25

How many rounds  does  the AES  -192  perform;-

8 / 25

The _____________ was designed to provide security at the transport layer:-

9 / 25

________ is  used  for   encrypting   data at  network  level ;-

10 / 25

Φ(21)= :-

11 / 25

Coaxial cables used in ________________ networks:-

12 / 25

Which is opposite  to the  open design principle :-

13 / 25

The purpose of shadow honeypot is  to randomly check suspicious traffic  identified by an anomaly detection system:-

14 / 25

Spamming   is  the attack   technique  in which  the same  message  is  sent  repeatedly  in order to overload the inbox  of the user;-

15 / 25

In which phase   the  hacker  install  backdoors  so  that his  ownership  with the  victim's   system  can be   retained later ;-

16 / 25

WTLS  provides  security   between the  mobile  device  and  the  WAP  gateway  to the internet ;-

17 / 25

What is the  size   of   the  'total length ' field  in IPv4  datagram :-

18 / 25

A model that  is the  demo  implementation of the system :-

19 / 25

A packet filter firewall filters at the ______________ or ___________ layer:-

20 / 25

Which security measures  is used to  prevent   unauthorized  access  to  physical areas :-

21 / 25

Which mode  is  recommend  for the NIST SP 800-90  Random number generator :-

22 / 25

Which is   a natural  candidate   for  stream  ciphers ;-

23 / 25

The  number  of  unique  substitution boxes   in DES  after  the  48 bit  XOR   operation are :-

24 / 25

Which   malware  does  not  clone   through  infection;-

25 / 25

COBOL and ADA is a programming language such as classified as;-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *