
Cybersecurity Quiz

Quiz
•
Other
•
Professional Development
•
Hard
Viswathika K
Used 1+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Challenge-Response authentication, the claimant:
Proves that she knows the secret without revealing it
Proves that she doesn't know the secret
Reveals the secret
Gives a challenge
Answer explanation
In Challenge-Response authentication, the claimant (the user trying to authenticate) is challenged to prove knowledge of a secret (such as a password or cryptographic key) without revealing the secret itself. This process involves the claimant using the secret to generate a valid response to a challenge issued by the verifier, thereby proving their identity without disclosing the secret.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in
Intrusion detection systems
Digital signatures
Data Compression
Certification
Answer explanation
In RSA encryption, encrypting a message with the private key and decrypting it with the public key is the basis of digital signatures. This is used to authenticate the sender's identity and ensure data integrity.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match List (I) with List (II):
List (I)
(A) DES
(B) AES
(C) 3 DES
(D) RSA
List (II)
(1) Key size - 256
(II) Key size - 1024
(III) Key size - 56
(IV) Key size - 168
Choose the correct answer from the options given below:
(A)-(I),(B)-(II),(C)-(IV),(D)-(III)
(A)-(III), (B)-(I),(C)-(IV),(D)-(II)
(A)-(III), (B)-(IV),(C)-(II),(D)-(I)
(A)-(IV), (B)-(II), (C)-(III),(D)-(I)
Answer explanation
DES (Data Encryption Standard):
DES is a symmetric key encryption algorithm that uses a key size of 56 bits.AES (Advanced Encryption Standard):
AES is a symmetric key encryption algorithm that can use key sizes of 128, 192, or 256 bits. For this matching, we consider the 256-bit key size3 DES (Triple DES):
3 DES applies the DES algorithm three times with a key size of 168 bits (effectively 56 bits used across three keys).RSA:
RSA is an asymmetric key algorithm and typically uses large key sizes, commonly 1024 bits or more.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mode is a block cipher implementation as a self-synchronizing stream cipher?
Cipher Block Chaining (CBC) mode
Cipher Feedback (CFB) mode
Electronic Codebook (ECB) mode
Output Feedback (OFB) mode
Answer explanation
Cipher Feedback (CFB) mode is a block cipher mode of operation that enables a block cipher to function as a self-synchronizing stream cipher. In CFB mode, each ciphertext block is used in the encryption process of the next block, making it self-synchronizing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
Cyber attack
Computer security
Cryptography
Digital hacking
Answer explanation
An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a cybercrime?
Denial of Service
Man in the Middle
Malware
AES
Answer explanation
Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of cyber attack?
Phishing
SQL Injections
Password Attack
All of the above
Answer explanation
Attacks are Phishing, SQL Injections, and Password Attack.
Phishing: The attacker sends a large number of fraudulent emails and gains access to the system.
SQL Injections: The attacker gains access to the protected information by adding malicious code to the SQL server.
Password Attack: Attackers gain access to the passwords unethically and gain access to the confidential data.
Create a free account and access millions of resources
Similar Resources on Wayground
22 questions
PMOlogy - ITS Monthly Meeting - Sep 2023

Quiz
•
Professional Development
17 questions
QUIZIZZ SUPER TRAINING - TASK 1

Quiz
•
Professional Development
20 questions
CN chapter 5 - Additional questions

Quiz
•
Professional Development
20 questions
COMPANY SECURITY OFFICER Quiz

Quiz
•
Professional Development
15 questions
Law Basics Review

Quiz
•
Professional Development
25 questions
Cybersecurity Quiz

Quiz
•
Professional Development
20 questions
KUIZ DIGITAL SAMS

Quiz
•
Professional Development
20 questions
Quiz Security+

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade