
Cybersecurity Quiz

Quiz
•
Other
•
Professional Development
•
Medium
Viswathika K
Used 5+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Challenge-Response authentication, the claimant:
Proves that she knows the secret without revealing it
Proves that she doesn't know the secret
Reveals the secret
Gives a challenge
Answer explanation
In Challenge-Response authentication, the claimant (the user trying to authenticate) is challenged to prove knowledge of a secret (such as a password or cryptographic key) without revealing the secret itself. This process involves the claimant using the secret to generate a valid response to a challenge issued by the verifier, thereby proving their identity without disclosing the secret.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in
Intrusion detection systems
Digital signatures
Data Compression
Certification
Answer explanation
In RSA encryption, encrypting a message with the private key and decrypting it with the public key is the basis of digital signatures. This is used to authenticate the sender's identity and ensure data integrity.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match List (I) with List (II):
List (I)
(A) DES
(B) AES
(C) 3 DES
(D) RSA
List (II)
(1) Key size - 256
(II) Key size - 1024
(III) Key size - 56
(IV) Key size - 168
Choose the correct answer from the options given below:
(A)-(I),(B)-(II),(C)-(IV),(D)-(III)
(A)-(III), (B)-(I),(C)-(IV),(D)-(II)
(A)-(III), (B)-(IV),(C)-(II),(D)-(I)
(A)-(IV), (B)-(II), (C)-(III),(D)-(I)
Answer explanation
DES (Data Encryption Standard):
DES is a symmetric key encryption algorithm that uses a key size of 56 bits.AES (Advanced Encryption Standard):
AES is a symmetric key encryption algorithm that can use key sizes of 128, 192, or 256 bits. For this matching, we consider the 256-bit key size3 DES (Triple DES):
3 DES applies the DES algorithm three times with a key size of 168 bits (effectively 56 bits used across three keys).RSA:
RSA is an asymmetric key algorithm and typically uses large key sizes, commonly 1024 bits or more.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mode is a block cipher implementation as a self-synchronizing stream cipher?
Cipher Block Chaining (CBC) mode
Cipher Feedback (CFB) mode
Electronic Codebook (ECB) mode
Output Feedback (OFB) mode
Answer explanation
Cipher Feedback (CFB) mode is a block cipher mode of operation that enables a block cipher to function as a self-synchronizing stream cipher. In CFB mode, each ciphertext block is used in the encryption process of the next block, making it self-synchronizing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
Cyber attack
Computer security
Cryptography
Digital hacking
Answer explanation
An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a cybercrime?
Denial of Service
Man in the Middle
Malware
AES
Answer explanation
Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of cyber attack?
Phishing
SQL Injections
Password Attack
All of the above
Answer explanation
Attacks are Phishing, SQL Injections, and Password Attack.
Phishing: The attacker sends a large number of fraudulent emails and gains access to the system.
SQL Injections: The attacker gains access to the protected information by adding malicious code to the SQL server.
Password Attack: Attackers gain access to the passwords unethically and gain access to the confidential data.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Cloud Guardians - Network Security

Quiz
•
1st Grade - Professio...
20 questions
Assessment on Fundamentals to CI

Quiz
•
Professional Development
16 questions
Travel Picture Dictionary

Quiz
•
10th Grade - Professi...
20 questions
Overview of Video Surveillance System

Quiz
•
Professional Development
20 questions
James Bond

Quiz
•
Professional Development
20 questions
A+ Port Numbers

Quiz
•
Professional Development
20 questions
CSA Payroll Review

Quiz
•
Professional Development
15 questions
KUIS EVALUASI SINAU

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Other
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development