Cyber Security MCQ questions and answers
February 9, 2022 2022-02-09 6:33Cyber Security MCQ questions and answers
Cyber Security MCQ questions and answers
Cyber Security mcq questions and answers
Q. 1 _______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
A : Network Security
B : Database Security
C : Information Security
D : Physical Security
Q. 2 _______ platforms are used for safety and protection of information in the cloud.
A : Cloud workload protection platforms
B : Cloud security protocols
C : AWS
D : One Drive
Q. 3 Compromising confidential information comes under _________
A : Bug
B : Threat
C : Vulnerability
D : Attack
Q. 4 An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
A : Cyber-crime
B : Cyber Attack
C : System hijacking
D : Digital crime
Q. 5 The CIA triad is often represented by which of the following?
A : Triangle
B : Diagonal
C : Ellipse
D : Circle
Q. 6 Related to information security, confidentiality is the opposite of which of the following?
A : Closure
B : Disclosure
C : Disaster
D : Disposal
Q. 7 _______ means the protection of data from modification by unknown users.
A : Confidentiality
B : Integrity
C : Authentication
D : Non-repudiationShow Answer
Q. 8 _______ of information means, only authorized users are capable of accessing the information.
A : Confidentiality
B : Integrity
C : Non-repudiation
D : Availability
Q. 9 This helps in identifying the origin of information and authentic user. This referred to here as _________
A : Confidentiality
B : Integrity
C : Authenticity
D : Availability
Q. 10 Data ___________ is used to ensure confidentiality.
A : Encryption
B : Locking
C : Decryption
D : Backup
Q. 11 What does OSI stand for in the OSI Security Architecure?
A : Open System Interface
B : Open Systems Interconnections
C : Open Source Initiative
D : Open Standard InterconnectionsShow Answer
Q. 12 A company requires its users to change passwords every month. This improves the ________ of the network.
A : Performance
B : Reliability
C : Security
D : None of the above
Q. 13 ________ provides privacy, integrity, and authentication in e-mail.
A : IPSec
B : SSL
C : PGP
D : none of the above
Q. 14 Release of message contents and Traffic analysis are two types of _________ attacks.
A : Active Attack
B : Modification of Attack
C : Passive attack
D : DoS AttackShow Answer
Q. 15 The ________ is encrypted text.
A : Cipher scricpt
B : Cipher text
C : Secret text
D : Secret script
Q. 16 Which of the following Algorithms not belong to symmetric encryption
A : 3DES (TripleDES)
B : RSA
C : RC5
D : IDEAShow Answer
Q. 17 Which is the largest disadvantage of the symmetric Encryption?
A : More complex and therefore more time-consuming calculations.
B : Problem of the secure transmission of the Secret Key.
C : Less secure encryption function.
D : Isn’t used any more.Show Answer
Q. 18 In cryptography, what is cipher?
A : algorithm for performing encryption and decryption
B : encrypted message
C : both algorithm for performing encryption and decryption and encrypted message
D : decrypted message
Q. 19 A ______ provides privacy for LANs that must communicate through the global Internet.
A : VPP
B : VNP
C : VNN
D : VPN
Q. 20 _______ uses the idea of certificate trust levels.
A : X509
B : PGP
C : KDC
D : none of the above
Q. 21 Which one of the following algorithm is not used in asymmetric-key cryptography?
A : rsa algorithm
B : diffie-hellman algorithm
C : electronic code book algorithm
D : dsa algorithm
Q. 22 What is data encryption standard (DES)?
A : block cipher
B : stream cipher
C : bit cipher
D : byte cipherShow Answer
Q. 23 A asymmetric-key (or public key ) cipher uses
A : 1 key
B : 2 key
C : 3 key
D : 4 keyShow Answer
Q. 24 _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
A : Malware Analysis
B : Exploit writing
C : Reverse engineering
D : Cryptography
Q.25 ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
A : Malware Analysis
B : Cryptography
C : Reverse engineering
D : Exploit writingShow Answer
Q. 26 Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
A : secret key
B : external programs
C : add-ons
D : secondary keyShow Answer
Q. 27 Conventional cryptography is also known as _____________ or symmetric-key encryption.
A : secret-key
B : public key
C : protected key
D : primary key
Q. 28 The procedure to add bits to the last block is termed as _________________
A : decryption
B : hashing
C : tuning
D : paddingShow Answer
Q. 29 ECC encryption system is __________
A : symmetric key encryption algorithm
B : asymmetric key encryption algorithm
C : not an encryption algorithm
D : block cipher method
Q. 30 ________function creates a message digest out of a message.
A : encryption
B : decryption
C : hash
D : none of the aboveShow Answer
Q. 31 Extensions to the X.509 certificates were added in version ____
A : 1
B : 2
C : 3
D : 4Show Answer
Q. 32 A digital signature needs ____ system
A : symmetric-key
B : asymmetric-key
C : either (a) or (b)
D : neither (a) nor (b)
Q. 33 Elliptic curve cryptography follows the associative property.
A : TRUE
B : FALSE
Q. 34 ECC stands for
A : Elliptic curve cryptography
B : Enhanced curve cryptography
C : Elliptic cone cryptography
D : Eclipse curve cryptography
Q. 35 When a hash function is used to provide message authentication, the hash function value is referred to as
A : Message Field
B : Message Digest
C : Message Score
D : Message Leap
Q. 36 Message authentication code is also known as
A : key code
B : hash code
C : keyed hash function
D : message key hash function
Q. 37 The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.
A : TRUE
B : FALSE
Q. 38 The DSS signature uses which hash algorithm?
A : MD5
B : SHA-2
C : SHA-1
D : Does not use hash algorithm
Q. 39 What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
A : 42 bytes
B : 32 bytes
C : 36 bytes
D : 48 bytes
Q. 40 In the handshake protocol which is the message type first sent between client and server ?
A : server_hello
B : client_hello
C : hello_request
D : certificate_request
Q. 41 One commonly used public-key cryptography method is the ______ algorithm.
A : RSS
B : RAS
C : RSA
D : RAA
Q. 42 The ________ method provides a one-time session key for two parties.
A : Diffie-Hellman
B : RSA
C : DES
D : AES
Q. 43 The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
A : man-in-the-middle
B : ciphertext attack
C : plaintext attack
D : none of the above
Q. 44 VPN is abbreviated as __________
A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Private Network
D : Virtual Protocol Networking
Q. 45 __________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.
A : Visual Private Network
B : Virtual Protocol Network
C : Virtual Protocol Networking
D : Virtual Private Network
Q. 46 Which of the statements are not true to classify VPN systems?
A : Protocols used for tunnelling the traffic
B : Whether VPNs are providing site-to-site or remote access connection
C : Securing the network from bots and malwares
D : Levels of security provided for sending and receiving data privately
Q. 47 What types of protocols are used in VPNs?
A : Application level protocols
B : Tunnelling protocols
C : Network protocols
D : Mailing protocols
Q. 48 VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
A : TRUE
B : False
Q. 49 There are _________ types of VPNs.
A : 3
B : 2
C : 5
D : 4
Q. 50 _________ type of VPNs are used for home private and secure connectivity.
A : Remote access VPNs
B : Site-to-site VPNs
C : Peer-to-Peer VPNs
D : Router-to-router VPNsShow