Information Security

75

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

CTR  mode is  more prone   than  the OBF  mode :-

2 / 25

Which  is  not  an  application  hash function :-

3 / 25

This is the inclusion of set message in otherwise unencryption text orimages:-

4 / 25

A  program  created  by Farmer  and  Venema  for  auditing  capability ;-

5 / 25

Which attack is   threatening  integrity ;

6 / 25

______________ is a type of antivirus program:-

7 / 25

In SSL   what is  used  for  authenticating   a  message :-

8 / 25

_____________ is the hacking approach where cyber criminals design fake websites for tricking or gaining additional traffic:-

9 / 25

Which antivirus  is  harmful  to the  computer :-

10 / 25

Confidentiality  can only  be provided  if  we perform  message   encryption before  the MAC  generation;-

11 / 25

In ____________ cryptography,   everyone  has access  too  everyone's  public  key :-

12 / 25

A  typical tape  drive  is  a  ______________ typical  disk drive :-

13 / 25

How many class C networks can be created in a class B network:-

14 / 25

They are malicious whose primary goal is to commit cybercrimes to make money. Who are 'they' in this context:-

15 / 25

A  technique   that enables  light  field which is   product of  light  source  scattered off  object :-

16 / 25

SHA-1 produces  a  hash value  of :-

17 / 25

In Blowfish  algorithm ,  blowfish has  improved  avalance  effect :-

18 / 25

TLS  has  now  become  SSL ;-

19 / 25

Which statement best describes how the principle would be broken if a computer was no longer accessible:-

20 / 25

Packet  filtering  firewalls  are  deployed  on ;-

21 / 25

Which is  the  step  function that provides  non linear  mapping :-

22 / 25

Brajesh  Shrivas  lives  at 60  , city center  Gwalior , India ;  this  data  record  is  an  example of ;-

23 / 25

In which  encryption key  is  used  to  encrypt and  decrypt  the data :-

24 / 25

How many  rounds  are present   in each iteration  function of SHA-3 :-

25 / 25

Coding  is  done  by the  developers ;-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *