
Cybersecurity Quiz

Quiz
•
Other
•
Professional Development
•
Medium
Viswathika K
Used 5+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Challenge-Response authentication, the claimant:
Proves that she knows the secret without revealing it
Proves that she doesn't know the secret
Reveals the secret
Gives a challenge
Answer explanation
In Challenge-Response authentication, the claimant (the user trying to authenticate) is challenged to prove knowledge of a secret (such as a password or cryptographic key) without revealing the secret itself. This process involves the claimant using the secret to generate a valid response to a challenge issued by the verifier, thereby proving their identity without disclosing the secret.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The RSA encryption algorithm also works in reverse, that is, you can encrypt a message with the private key and decrypt it using the public key. This property is used in
Intrusion detection systems
Digital signatures
Data Compression
Certification
Answer explanation
In RSA encryption, encrypting a message with the private key and decrypting it with the public key is the basis of digital signatures. This is used to authenticate the sender's identity and ensure data integrity.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match List (I) with List (II):
List (I)
(A) DES
(B) AES
(C) 3 DES
(D) RSA
List (II)
(1) Key size - 256
(II) Key size - 1024
(III) Key size - 56
(IV) Key size - 168
Choose the correct answer from the options given below:
(A)-(I),(B)-(II),(C)-(IV),(D)-(III)
(A)-(III), (B)-(I),(C)-(IV),(D)-(II)
(A)-(III), (B)-(IV),(C)-(II),(D)-(I)
(A)-(IV), (B)-(II), (C)-(III),(D)-(I)
Answer explanation
DES (Data Encryption Standard):
DES is a symmetric key encryption algorithm that uses a key size of 56 bits.AES (Advanced Encryption Standard):
AES is a symmetric key encryption algorithm that can use key sizes of 128, 192, or 256 bits. For this matching, we consider the 256-bit key size3 DES (Triple DES):
3 DES applies the DES algorithm three times with a key size of 168 bits (effectively 56 bits used across three keys).RSA:
RSA is an asymmetric key algorithm and typically uses large key sizes, commonly 1024 bits or more.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mode is a block cipher implementation as a self-synchronizing stream cipher?
Cipher Block Chaining (CBC) mode
Cipher Feedback (CFB) mode
Electronic Codebook (ECB) mode
Output Feedback (OFB) mode
Answer explanation
Cipher Feedback (CFB) mode is a block cipher mode of operation that enables a block cipher to function as a self-synchronizing stream cipher. In CFB mode, each ciphertext block is used in the encryption process of the next block, making it self-synchronizing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
Cyber attack
Computer security
Cryptography
Digital hacking
Answer explanation
An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a cybercrime?
Denial of Service
Man in the Middle
Malware
AES
Answer explanation
Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of cyber attack?
Phishing
SQL Injections
Password Attack
All of the above
Answer explanation
Attacks are Phishing, SQL Injections, and Password Attack.
Phishing: The attacker sends a large number of fraudulent emails and gains access to the system.
SQL Injections: The attacker gains access to the protected information by adding malicious code to the SQL server.
Password Attack: Attackers gain access to the passwords unethically and gain access to the confidential data.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
IoTCC BATCH 1 VIVA

Quiz
•
Professional Development
15 questions
Kamar's Quiz

Quiz
•
Professional Development
18 questions
Salesforce CRM Masterclass

Quiz
•
Professional Development
20 questions
Information System Administration Quiz in english

Quiz
•
Professional Development
15 questions
Wipro_Pre Induction - Quiz

Quiz
•
Professional Development
16 questions
Datamellon DevJam at LSW23

Quiz
•
Professional Development
15 questions
Términos de Seguridad de Información

Quiz
•
Professional Development
20 questions
DCM Unit 5 Revision

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade