Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

20 Qs

quiz-placeholder

Similar activities

Guess The Gravity Falls Character!

Guess The Gravity Falls Character!

KG - Professional Development

15 Qs

Nets Week - Basic Firewall

Nets Week - Basic Firewall

10th Grade - Professional Development

25 Qs

Cyber Security

Cyber Security

Professional Development

15 Qs

Post-Test Under Cyber GYAN Project

Post-Test Under Cyber GYAN Project

Professional Development

25 Qs

Ofimática Unidad 1: Malware I

Ofimática Unidad 1: Malware I

Professional Development

21 Qs

POST-TEST AVSEC

POST-TEST AVSEC

Professional Development

20 Qs

SKO 2025 QUIZ

SKO 2025 QUIZ

Professional Development

15 Qs

Information System Administration Quiz in english

Information System Administration Quiz in english

Professional Development

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

Professional Development

Hard

Created by

Viswathika K

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Challenge-Response authentication, the claimant:

Proves that she knows the secret without revealing it

Proves that she doesn't know the secret

Reveals the secret

Gives a challenge

Answer explanation

In Challenge-Response authentication, the claimant (the user trying to authenticate) is challenged to prove knowledge of a secret (such as a password or cryptographic key) without revealing the secret itself. This process involves the claimant using the secret to generate a valid response to a challenge issued by the verifier, thereby proving their identity without disclosing the secret.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in

Intrusion detection systems

Digital signatures

Data Compression

Certification

Answer explanation

In RSA encryption, encrypting a message with the private key and decrypting it with the public key is the basis of digital signatures. This is used to authenticate the sender's identity and ensure data integrity.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match List (I) with List (II):

List (I)

(A) DES

(B) AES

(C) 3 DES

(D) RSA

List (II)

(1) Key size - 256

(II) Key size - 1024

(III) Key size - 56

(IV) Key size - 168

Choose the correct answer from the options given below:

(A)-(I),(B)-(II),(C)-(IV),(D)-(III)

(A)-(III), (B)-(I),(C)-(IV),(D)-(II)

(A)-(III), (B)-(IV),(C)-(II),(D)-(I)

(A)-(IV), (B)-(II), (C)-(III),(D)-(I)

Answer explanation

  1. DES (Data Encryption Standard):
    DES is a symmetric key encryption algorithm that uses a key size of 56 bits.

  2. AES (Advanced Encryption Standard):
    AES is a symmetric key encryption algorithm that can use key sizes of 128, 192, or 256 bits. For this matching, we consider the 256-bit key size

  3. 3 DES (Triple DES):
    3 DES applies the DES algorithm three times with a key size of 168 bits (effectively 56 bits used across three keys).

  4. RSA:
    RSA is an asymmetric key algorithm and typically uses large key sizes, commonly 1024 bits or more.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mode is a block cipher implementation as a self-synchronizing stream cipher?

Cipher Block Chaining (CBC) mode

Cipher Feedback (CFB) mode

Electronic Codebook (ECB) mode

Output Feedback (OFB) mode

Answer explanation

Cipher Feedback (CFB) mode is a block cipher mode of operation that enables a block cipher to function as a self-synchronizing stream cipher. In CFB mode, each ciphertext block is used in the encryption process of the next block, making it self-synchronizing.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

Cyber attack

Computer security

Cryptography

Digital hacking

Answer explanation

An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.

 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a cybercrime?

Denial of Service

Man in the Middle

Malware

AES

Answer explanation

Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of cyber attack?

Phishing

SQL Injections

Password Attack

All of the above

Answer explanation

Attacks are Phishing, SQL Injections, and Password Attack.

Phishing: The attacker sends a large number of fraudulent emails and gains access to the system.

SQL Injections: The attacker gains access to the protected information by adding malicious code to the SQL server.

Password Attack: Attackers gain access to the passwords unethically and gain access to the confidential data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?