6

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

Which information security technology is used for avoiding browser based hacking:-

2 / 25

Primary data model is relational model in today for commercial  _______________:-

3 / 25

________________ is defined as attempt to seal,spy damage computer systems, or their associated information:- 

4 / 25

The full form of EDR is:-

5 / 25

This is the name for the group of programmers who are hired to expose errors in new software:-

6 / 25

______________ is a type of antivirus program:-

7 / 25

_______________ Was invented by Phil Zimmermann to provide all four aspects of security in the sending email:-

8 / 25

All methods are destroying data on hard disk are sufficient except;-

9 / 25

Which of the following is a private search engine:-

10 / 25

The _______________ protocol provides message authentication and integrity , but not privacy:-

11 / 25

What is used for encryption data at the network level:-

12 / 25

Specialization and generalization is a property of entity sets created by is known as:-

13 / 25

In an electronic codebook cipher, each block of ciphertext:-

14 / 25

_____________ is a form of eavesdropping used to pick up telecommunication signals by monitoring the electromagnetic fields:-

15 / 25

By creating distinctions among specialization emphasizes on differences relations on:-

16 / 25

Which is not a step followed by cyber criminals  in data breaching:-

17 / 25

Which scanners for ports  and IP addresses is most used by users:-

18 / 25

When discussing IDS/IPS , what is a signature:-

19 / 25

Pick one method for hiding information inside a picture:-

20 / 25

A cyber criminal tester uses the additional data that stores certain instructions in the memory for activities to break the system in which of the following attack:-

21 / 25

Security incident plan should be performed annually:-

22 / 25

TCP protocols are conncetionless:-

23 / 25

Polyalphabetic cipher is a form of one time pad:-

24 / 25

Any of comparison operators of join operation which uses is classified as:-

25 / 25

An organization has developed its first ever computer security include response procedure. What type of test should be undertaken first:-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *