Cyber Security Essentials -Quiz 2 12th august

Cyber Security Essentials -Quiz 2 12th august

University

10 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity

Introduction to Cybersecurity

9th Grade - University

10 Qs

Information Security

Information Security

University

10 Qs

Lesson 4 - ITIL Availability Management Quiz

Lesson 4 - ITIL Availability Management Quiz

University

6 Qs

CryptoQuiz

CryptoQuiz

University

15 Qs

Hacker

Hacker

University

15 Qs

Injection Part 2

Injection Part 2

University

10 Qs

Information Assurance and Security

Information Assurance and Security

University

12 Qs

Cyber Security Quiz: Protect and Analyse

Cyber Security Quiz: Protect and Analyse

University

10 Qs

Cyber Security Essentials -Quiz 2 12th august

Cyber Security Essentials -Quiz 2 12th august

Assessment

Quiz

Computers

University

Medium

Created by

Udhayakumar Shanmugam

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To ensure ....................................., the system uses digital signatures to verify that transactions are authorized and unaltered

data safety

data integrity

data confedentiality

data availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a mathematical function used in cryptography which takes variable length as input and returns an output of fixed length

Hashing

Digital Signature

Encryption

Authenticatio

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following the correctly represent "Availability"?

Availability =MTBF/MTBF + MTTR

Availability =MTTR/MTBF + MTTR

Availability =MTBF/ MTTR

Availability =MTTR/ MTBF

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Infrastructure Security, Operational Security and Digital Forensics are some of the procedures that are done by.................................

Red Team

Blue Team

Purple Team

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A .................................... is a security system that monitors and controls network traffic based on predefined rules, acting as a barrier between a trusted network and untrusted networks like the internet

Firewall

Intrusion Detection System

Internet Gateway

FireFox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

They are small text files that websites store on a user's device, enabling them to "remember" information about the user's visit. This remembrance allows websites to personalize content, maintain user sessions (like keeping you logged in), and track browsing behaviour for analytics.

Cookies

Sessions

Authenticator App

Browsing History

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An authenticator app is a mobile application that provides an extra layer of security to your online accounts by generating...................................................................... These passwords are used for two-factor authentication (2FA) and help protect your accounts from unauthorized access.

Numerical Password

One Time Passwords(OTPs)

Time-based one-time passwords (TOTPs)

High Security Passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?