0 of 25 Questions completed
You have already completed the exam before. Hence you can not start it again.
Exam is loading…
You must sign in or sign up to start the exam.
You must first complete the following:
Time has elapsed
From the options below, which of them is not a threat to information security?
From the options below, which of them is not a vulnerability to information security?
_____ platforms are used for safety and protection of information in the cloud.
Which of the following information security technology is used for avoiding browser-based hacking?
Compromising confidential information comes under _________
Possible threat to any information cannot be ________________
_______is purpose of a Denial of Service attack
Sniffing is used to perform ______________ fingerprinting.
Phishing is a form of ____________________.
What is the best statement for taking advantage of a weakness in the security of an IT system?
_______ means to prove access the system’s resources
The full form of Malware is ________
This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?
What is the full form of LDAP?
What is the full form of CIA under information security?
What is called a single point of access for several networking services?
Which activities endanger the sovereignty and integrity of nation?
A malicious program spreading through Internet and storage media and attacking the data in victims computer is called_______.
Potential weaknesses in IT infrastructure through which a cyber attack might occur is called __.
The person using vulnerability in operating system or application software or IT infrastructure to intrude in to the computer of a victim is called ______ .
The security audit team______ to keep the computers safe from cyber attacks.
A single point of access for several networking services is called _____.
Protecting access to a computer through________ is called access control
._______of access rights in source code development means verification of role before permitting access to source code.
Protecting the data divulged by customers from unauthorized access is called____.