
CYBER SECURITY MCQS
Authored by Abdulmalik Ahmad Lawan
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
120 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which component of the CIA triad ensures that data is not altered without authorization?
Confidentiality
Integrity
Availability
Authenticity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes phishing?
A network protocol
Physical theft of a device
Deceptive attempt to obtain sensitive info
Hardware failure
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is NOT a type of malware?
Trojan
Worm
Firewall
Ransomware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In symmetric encryption the same key is used for:
Hashing and signing
Encryption and decryption
Decryption and compression
Signing and verification
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A firewall primarily protects a network by:
Detecting viruses on endpoints
Blocking unauthorized traffic
Increasing bandwidth
Encrypting files
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
PKI is built around the use of:
Symmetric keys only
Physical tokens
Digital certificates and asymmetric keys
One-time passwords
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The primary purpose of a VPN is to:
Speed up internet connection
Provide secure tunnel over public networks
Replace antivirus software
Increase RAM
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?