Advertisements
Advertisements
Advertisements
6

Welcome

to

Shaheen Leader Academy

We expect 100% result.

Click on Start Button. 

Your time is Ended. Thanks


BS (Honors) Information Security Quiz

1 / 25

IPSec defines , two protocols ______________________ and ___________________:-

2 / 25

Process management, resource management, access management, are examples of:-

3 / 25

In the asymmetric key method, used for confidentiality the receiver uses his/ her own _____________ to decrypt the message:-

4 / 25

IDEA algorithm generates _____________ keys:-

5 / 25

Which statement is used to revoke an authorization:-

6 / 25

Which cyber security principles limits how privileges are started whenever an object or subject is created:-

7 / 25

________________ is defined as attempt to seal,spy damage computer systems, or their associated information:- 

8 / 25

In modulo arithmetic, When A-B < 0 then:-

9 / 25

Palm scan , fingerprint scan, and iris scan are forms of:-

10 / 25

Password leakage is a major security problem:-

11 / 25

Which phrases describes taking someone's creation and using it for one's own advantage:-

12 / 25

___________ keeps tabs on every online activity the victim engages in, complies all the data in the background , and send it to a third party;-

13 / 25

To represent both data and relationship among a collection of tables data is known as:-

14 / 25

This is the name for the issuer of a PKI certificates;-

15 / 25

An organization has developed  new type of printer. What approach should the organization take to protect this invention:-

16 / 25

__________________ key is used for short messages:-

17 / 25

A program in which harmful code is contained inside the apparent harmless programming or data:-

18 / 25

When we update any  tuple in the relation which authorization on a relation allows a user to:-

19 / 25

Which is typically used when wi-fi hacking:-

20 / 25

This is a series of messages sent by some one attempting to break into a computer to learn which computer network service the computer provides:-

21 / 25

By creating distinctions among specialization emphasizes on differences relations on:-

22 / 25

The system where two independent pieces of data are used to identify a user is called as:-

23 / 25

This is the forging of an e-mail header so that the message appears to have originated from someone other than actual source;-

24 / 25

This type of attack may cause additional damage by sending data containing codes designed to trigger specific actions,:-

25 / 25

This is a compromised web site that is being used as an attack launch point in adenial of service attack:-

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *