
Cybersecurity Quiz
Authored by Viswathika K
Other
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Challenge-Response authentication, the claimant:
Proves that she knows the secret without revealing it
Proves that she doesn't know the secret
Reveals the secret
Gives a challenge
Answer explanation
In Challenge-Response authentication, the claimant (the user trying to authenticate) is challenged to prove knowledge of a secret (such as a password or cryptographic key) without revealing the secret itself. This process involves the claimant using the secret to generate a valid response to a challenge issued by the verifier, thereby proving their identity without disclosing the secret.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in
Intrusion detection systems
Digital signatures
Data Compression
Certification
Answer explanation
In RSA encryption, encrypting a message with the private key and decrypting it with the public key is the basis of digital signatures. This is used to authenticate the sender's identity and ensure data integrity.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match List (I) with List (II):
List (I)
(A) DES
(B) AES
(C) 3 DES
(D) RSA
List (II)
(1) Key size - 256
(II) Key size - 1024
(III) Key size - 56
(IV) Key size - 168
Choose the correct answer from the options given below:
(A)-(I),(B)-(II),(C)-(IV),(D)-(III)
(A)-(III), (B)-(I),(C)-(IV),(D)-(II)
(A)-(III), (B)-(IV),(C)-(II),(D)-(I)
(A)-(IV), (B)-(II), (C)-(III),(D)-(I)
Answer explanation
DES (Data Encryption Standard):
DES is a symmetric key encryption algorithm that uses a key size of 56 bits.
AES (Advanced Encryption Standard):
AES is a symmetric key encryption algorithm that can use key sizes of 128, 192, or 256 bits. For this matching, we consider the 256-bit key size
3 DES (Triple DES):
3 DES applies the DES algorithm three times with a key size of 168 bits (effectively 56 bits used across three keys).
RSA:
RSA is an asymmetric key algorithm and typically uses large key sizes, commonly 1024 bits or more.
DES (Data Encryption Standard):
DES is a symmetric key encryption algorithm that uses a key size of 56 bits.
AES (Advanced Encryption Standard):
AES is a symmetric key encryption algorithm that can use key sizes of 128, 192, or 256 bits. For this matching, we consider the 256-bit key size
3 DES (Triple DES):
3 DES applies the DES algorithm three times with a key size of 168 bits (effectively 56 bits used across three keys).
RSA:
RSA is an asymmetric key algorithm and typically uses large key sizes, commonly 1024 bits or more.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mode is a block cipher implementation as a self-synchronizing stream cipher?
Cipher Block Chaining (CBC) mode
Cipher Feedback (CFB) mode
Electronic Codebook (ECB) mode
Output Feedback (OFB) mode
Answer explanation
Cipher Feedback (CFB) mode is a block cipher mode of operation that enables a block cipher to function as a self-synchronizing stream cipher. In CFB mode, each ciphertext block is used in the encryption process of the next block, making it self-synchronizing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
Cyber attack
Computer security
Cryptography
Digital hacking
Answer explanation
An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a cybercrime?
Denial of Service
Man in the Middle
Malware
AES
Answer explanation
Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of cyber attack?
Phishing
SQL Injections
Password Attack
All of the above
Answer explanation
Attacks are Phishing, SQL Injections, and Password Attack.
Phishing: The attacker sends a large number of fraudulent emails and gains access to the system.
SQL Injections: The attacker gains access to the protected information by adding malicious code to the SQL server.
Password Attack: Attackers gain access to the passwords unethically and gain access to the confidential data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Innovation and Creativity
Quiz
•
Professional Development
17 questions
Banking
Quiz
•
Professional Development
16 questions
Costings
Quiz
•
Professional Development
20 questions
SEMANGAT MERDEKA KE-63
Quiz
•
KG - Professional Dev...
15 questions
Spider man quiz
Quiz
•
3rd Grade - Professio...
16 questions
Srimad Bhagawat GIta Quiz 21/12/2024
Quiz
•
Professional Development
20 questions
Intro 7 Writing Exam
Quiz
•
Professional Development
20 questions
Draw toolbar & Shortcuts
Quiz
•
7th Grade - Professio...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Other
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development