Cybersecurity Quiz

Cybersecurity Quiz

University

46 Qs

quiz-placeholder

Similar activities

Syber mid1

Syber mid1

University

46 Qs

ICT Fest 2025 Quiz

ICT Fest 2025 Quiz

University

50 Qs

Internet Infrastructure

Internet Infrastructure

11th Grade - University

45 Qs

Information Security model exam

Information Security model exam

University

50 Qs

Ujian Penilaian Administrasi infrastruktur Jaringan (AIJ)

Ujian Penilaian Administrasi infrastruktur Jaringan (AIJ)

12th Grade - University

50 Qs

CN Quiz-1

CN Quiz-1

University

50 Qs

COM411 Class Test 2

COM411 Class Test 2

University

50 Qs

BTVI - 2204 Cohort 4 - Midterm Exam

BTVI - 2204 Cohort 4 - Midterm Exam

University

45 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Saya Arango

Used 4+ times

FREE Resource

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does CIA stand for in security?

Control, Integrity, Availability

Confidentiality, Integrity, Availability

Confidentiality, Identity, Authorization

Compliance, Integrity, Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

AAA in security refers to:

Access, Authorization, Accounting

Authentication, Authorization, Accounting

Authentication, Access, Administration

Availability, Authentication, Authorization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DES (Data Encryption Standard) uses which type of encryption?

Asymmetric

Symmetric

Hashing

Quantum

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DES is vulnerable due to its:

256-bit key

Feistel network

56-bit key

Substitution-permutation design

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

AES (Advanced Encryption Standard) is considered secure because it supports:

56-bit keys

128/192/256-bit keys

MD5 hashing

RC4 encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic hash function is deprecated due to collision vulnerabilities?

SHA-256

AES

MD5

HMAC

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

SHA-256 is commonly used in:

Legacy systems

Digital signatures and blockchain

WEP encryption

TCP handshakes

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?