Information Security

45

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

A  concern of  authentication   that deals  with user rights :-

2 / 25

An algorithm  in encryption is called :-

3 / 25

Whaling  is  the technique   used to  take  deep   and __________ information  about   any  individual :-

4 / 25

What is  the  block   size in the  simplified  AES  algorithm ;-

5 / 25

An algorithm in  encryption is called :-

6 / 25

What is the  Discrete  logarithm  to the  base  15 (mod 19) for a = 9 :-

7 / 25

How many  modes  of  operation  are there in  DES  and  AES :-

8 / 25

Authentication   is  typically  based  on password  ,  smart card  etc ;-

9 / 25

Which is not a form of scanning:-

10 / 25

There  are  64  bits  to  permute :-

11 / 25

There is  an addition of  round  key  before  the start of  the  AES  round  algorithms;-

12 / 25

What is  the  value  of  ipad  in the HMAC  structure :-

13 / 25

Possible  threat  to  any information  can not  be  ;-

14 / 25

Data  authentication algorithm  is  based  on ;-

15 / 25

Which  is  also   considered   malicious  software :-

16 / 25

When you book  online  tickets   by  swiping   your  card ,   the  details  of   the card  gets  stored  in :-

17 / 25

CTR is  the  recommended mode   for   the ANSI  standard  X9.82  Random Number generator :-

18 / 25

Compromising confidential information comes under:-

19 / 25

A trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies:-

20 / 25

A preferable  cryptographic   algorithm should  have  a  good  avalanche  effect ;-

21 / 25

_________ is  the  way   through  which majority  of  the malware   gets  installed  in our  system :-

22 / 25

Common biometric solutions that are suitable for building entrance control include:-

23 / 25

In ___________ encryption, everyone has access to everyone's public key:-

24 / 25

_________ means  that the  sender  and  the receiver   expect  confidentiality ;-

25 / 25

Point of  sale  intrusion  does  not   deal with financial  details   and  credits card information;-

 

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *