
CNS quiz1

Quiz
•
Computers
•
12th Grade
•
Hard
DNSB Kavitha
Used 1+ times
FREE Resource
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is a phishing attack and how does it work?
A phishing attack is a deceptive attempt to obtain sensitive information by impersonating a legitimate entity, often through emails or fake websites.
A phishing attack is a type of malware that infects computers through software updates.
A phishing attack is a legitimate marketing strategy to collect user data.
A phishing attack is a method to enhance cybersecurity by monitoring user behavior.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Explain the concept of TCP session hijacking.
TCP session hijacking refers to the process of shutting down an active TCP session.
TCP session hijacking is a method of encrypting data packets for security.
TCP session hijacking involves creating a new TCP session from scratch.
TCP session hijacking is a method of taking control of an active TCP session by intercepting and injecting packets.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the main principles of block cipher design?
Compression, encoding, and decoding
The main principles of block cipher design are confusion, diffusion, and key schedules.
Encryption, decryption, and authentication
Substitution, transposition, and hashing
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the essential features of a standard block cipher's decryption process?
Decryption in block ciphers is performed using the same key as encryption, with no changes to the algorithm.
Block ciphers decrypt data in fixed-size blocks, applying the inverse of the encryption transformations.
A standard block cipher uses a different key for decryption than for encryption.
Decryption in traditional block ciphers involves multiple rounds of inverse substitution and permutation, similar to the encryption process.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What are the common consequences of SQL injection attacks and what measures can be taken to mitigate them?
SQL injection attacks can lead to unauthorized access to sensitive data, data loss, and corruption. Mitigation measures include using web application firewalls, regular security testing, and keeping software up to date.
SQL injection attacks are harmless and do not affect applications.
SQL injection attacks can be prevented by using only stored procedures.
SQL injection attacks improve the performance of database systems.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the key differences between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys (public and private).
Symmetric encryption is slower than asymmetric encryption.
Symmetric encryption requires more computational power than asymmetric encryption.
Asymmetric encryption is used for data at rest, while symmetric encryption is used for data in transit.
Similar Resources on Wayground
10 questions
OSI Model Layers

Quiz
•
12th Grade
10 questions
J277 Utility Software (Encryption & Defragmentation)

Quiz
•
10th - 12th Grade
10 questions
Cryptography Basics

Quiz
•
12th Grade
10 questions
Modelo OSI e TCP/IP

Quiz
•
12th Grade - University
10 questions
1.1.11 Causes of data loss

Quiz
•
11th Grade - University
10 questions
OSI LAYER TLJ XI TKJ

Quiz
•
9th - 12th Grade
5 questions
Cryptography

Quiz
•
9th - 12th Grade
10 questions
Quantum Computing

Quiz
•
8th Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade