Search Header Logo

CYBER SECURITY MCQS

Authored by Abdulmalik Ahmad Lawan

Computers

University

Used 1+ times

CYBER SECURITY MCQS
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

120 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of the CIA triad ensures that data is not altered without authorization?

Confidentiality
Integrity
Availability
Authenticity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes phishing?

A network protocol
Physical theft of a device
Deceptive attempt to obtain sensitive info
Hardware failure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT a type of malware?

Trojan
Worm
Firewall
Ransomware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric encryption the same key is used for:

Hashing and signing
Encryption and decryption
Decryption and compression
Signing and verification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A firewall primarily protects a network by:

Detecting viruses on endpoints
Blocking unauthorized traffic
Increasing bandwidth
Encrypting files

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PKI is built around the use of:

Symmetric keys only
Physical tokens
Digital certificates and asymmetric keys
One-time passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The primary purpose of a VPN is to:

Speed up internet connection
Provide secure tunnel over public networks
Replace antivirus software
Increase RAM

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers