Search Header Logo

Soalan Kuiz Keselamatan Siber

Authored by Bram Boo

Mathematics

Professional Development

Used 1+ times

Soalan Kuiz Keselamatan Siber
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main threat posed by quantum computers to current cybersecurity systems?

Internet traffic congestion

Wi-Fi access disruption

Breaking classical cryptography

Computer hardware failure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term Harvest Now, Decrypt Later mean?

Harvesting digital data for sale on the black market

Storing encrypted data today to be decrypted in the future

Deleting old data after use

Encrypting data with two layers of security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malaysia needs to implement PQC because the financial and government sectors are at high risk of future quantum attacks.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step that organizations need to take in the process of migrating to PQC?

Buy their own quantum computer

Immediately discard the old system

Conduct a cryptographic inventory

Wait for new standards to be completed

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of using PQC algorithms?

Encrypting data using old technology

Replacing symmetric cryptography

Protecting data from quantum attacks

Speeding up internet access

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do organizations need to start migrating to PQC now even though practical quantum computers do not yet exist?

Because all old data is already exposed

Due to the threat of 'Harvest Now, Decrypt Later'

Quantum computers are sold commercially

No additional costs are required

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a PQC algorithm that has been standardized by NIST (2024)?

RSA-2048

CRYSTALS-Kyber

SHA-256

AES-128

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?