
Cybersecurity Quiz
Authored by Viswathika K
Other
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Challenge-Response authentication, the claimant:
Proves that she knows the secret without revealing it
Proves that she doesn't know the secret
Reveals the secret
Gives a challenge
Answer explanation
In Challenge-Response authentication, the claimant (the user trying to authenticate) is challenged to prove knowledge of a secret (such as a password or cryptographic key) without revealing the secret itself. This process involves the claimant using the secret to generate a valid response to a challenge issued by the verifier, thereby proving their identity without disclosing the secret.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in
Intrusion detection systems
Digital signatures
Data Compression
Certification
Answer explanation
In RSA encryption, encrypting a message with the private key and decrypting it with the public key is the basis of digital signatures. This is used to authenticate the sender's identity and ensure data integrity.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match List (I) with List (II):
List (I)
(A) DES
(B) AES
(C) 3 DES
(D) RSA
List (II)
(1) Key size - 256
(II) Key size - 1024
(III) Key size - 56
(IV) Key size - 168
Choose the correct answer from the options given below:
(A)-(I),(B)-(II),(C)-(IV),(D)-(III)
(A)-(III), (B)-(I),(C)-(IV),(D)-(II)
(A)-(III), (B)-(IV),(C)-(II),(D)-(I)
(A)-(IV), (B)-(II), (C)-(III),(D)-(I)
Answer explanation
DES (Data Encryption Standard):
DES is a symmetric key encryption algorithm that uses a key size of 56 bits.
AES (Advanced Encryption Standard):
AES is a symmetric key encryption algorithm that can use key sizes of 128, 192, or 256 bits. For this matching, we consider the 256-bit key size
3 DES (Triple DES):
3 DES applies the DES algorithm three times with a key size of 168 bits (effectively 56 bits used across three keys).
RSA:
RSA is an asymmetric key algorithm and typically uses large key sizes, commonly 1024 bits or more.
DES (Data Encryption Standard):
DES is a symmetric key encryption algorithm that uses a key size of 56 bits.
AES (Advanced Encryption Standard):
AES is a symmetric key encryption algorithm that can use key sizes of 128, 192, or 256 bits. For this matching, we consider the 256-bit key size
3 DES (Triple DES):
3 DES applies the DES algorithm three times with a key size of 168 bits (effectively 56 bits used across three keys).
RSA:
RSA is an asymmetric key algorithm and typically uses large key sizes, commonly 1024 bits or more.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mode is a block cipher implementation as a self-synchronizing stream cipher?
Cipher Block Chaining (CBC) mode
Cipher Feedback (CFB) mode
Electronic Codebook (ECB) mode
Output Feedback (OFB) mode
Answer explanation
Cipher Feedback (CFB) mode is a block cipher mode of operation that enables a block cipher to function as a self-synchronizing stream cipher. In CFB mode, each ciphertext block is used in the encryption process of the next block, making it self-synchronizing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
Cyber attack
Computer security
Cryptography
Digital hacking
Answer explanation
An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a cybercrime?
Denial of Service
Man in the Middle
Malware
AES
Answer explanation
Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of cyber attack?
Phishing
SQL Injections
Password Attack
All of the above
Answer explanation
Attacks are Phishing, SQL Injections, and Password Attack.
Phishing: The attacker sends a large number of fraudulent emails and gains access to the system.
SQL Injections: The attacker gains access to the protected information by adding malicious code to the SQL server.
Password Attack: Attackers gain access to the passwords unethically and gain access to the confidential data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Agency OBX -Day 1 Quiz
Quiz
•
Professional Development
19 questions
Heath and Safety In Animal Care
Quiz
•
8th Grade - Professio...
20 questions
todo sobre games
Quiz
•
Professional Development
25 questions
Try Out 1 Bahasa Indonesia SMK
Quiz
•
Professional Development
16 questions
Newspaper
Quiz
•
5th Grade - Professio...
15 questions
IMT TEAM BUILDING 2023
Quiz
•
Professional Development
15 questions
Avengers quiz
Quiz
•
3rd Grade - Professio...
18 questions
Fire Dynamic
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Other
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...