Q1: In which of the following, a person is constantly followed/chased by another person or group of several peoples?
- Answer: Stalking
-
Q2: Which of the following is considered as the unsolicited commercial email?
- Answer: Spam
-
Q3: _____ is a type of software designed to help the user's computer detect viruses and avoid them.
- Answer: Antivirus
-
Q4: Which one of the following is a type of antivirus program?
- Answer: All of the above (Norton, McAfee, Kaspersky)
-
Q5: It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. It is known as the
- Answer: Firewall
-
Q6: Which of the following refers to the violation of the principle if a computer is no more accessible?
- Answer: Availability
-
Q7: To protect the computer from a virus, one must keep _____ on in the computer system.
- Answer: Antivirus
-
Q8: In CIA, C stands for:
- Answer: Confidentiality
-
Q9: In CIA, I stands for:
- Answer: Integrity
-
Q10: In CIA, A stands for:
- Answer: Availability
- Q11: Symmetric encryption uses _____ key(s):
- Answer: One
- Q12: A-Symmetric encryption uses _____ key(s):
- Answer: Two
- Q13: Encryption algorithm is used to transform plaintext into:
- Answer: Cipher Text
- Q14: Which one of the following is also referred to as malicious software?
- Answer: Malware
- Q15: The encryption techniques are primarily used for improving the:
- Answer: Security
- Q16: SSL stands for:
- Answer: Secure Socket Layer
- Q17: ECC stands for:
- Answer: Elliptic Curve Cryptography
- Q18: SAAS stands for:
- Answer: Software as a Service
- Q19: PAAS stands for:
- Answer: Platform as a Service
Q1: Which of the following is defined as an attempt to steal, spy, damage, or destroy computer systems, networks, or their associated information?
- Answer: Cyber-attack
- Answer: Cyber-attack
-
Q2: Which of the following is not a cybercrime?
- Answer: Malware
-
Q3: Which of the following is a type of cyber-attack?
- Answer: All of the above (Phishing, SQL Injections, Password Attack)
-
Q4: Which of the following is defined as an attempt to harm, damage, or cause a threat to a system or network?
- Answer: Cyber Attack
-
Q5: Which of the following online service's privacy cannot be protected using Tor?
- Answer: Browsing data
-
Q6: Which of the following is the least strong security encryption standard?
- Answer: WEP
-
Q7: Which of the following can diminish the chance of data leakage?
- Answer: Cryptography
-
Q8: A malicious hacker can gain access illegally to a system if the system is not properly tested in the scanning and gaining access phase.
- Answer: True
-
Q9: In which phase, the hackers install backdoors so that his/her ownership with the victim's system can be retained later?
- Answer: Maintaining Access
-
Q10: Which of the following is the tool used for this purpose?
- Answer: Nmap
- Q11: The scrambled message produced as output is:
- Answer: Cipher Text
- Q12: The most important symmetric algorithm, all of which are block ciphers, are the DES, triple DES, and the:
- Answer: AES
- Q13: On average, _____ of all possible keys must be tried in order to achieve success with a brute-force attack.
- Answer: Half
- Q14: The purpose of a hash function is to produce a "fingerprint" of a:
- Answer: File, message, or block of data
- Q15: SHA is a:
- Answer: Hash function
- Q16: What data should be subject to a data classification scheme?
- Answer: All data
- Q17: The original message or data that is fed into the algorithm is:
- Answer: Plain Text
- Q18: The decryption algorithm is the encryption algorithm run in inverse.
- Answer: True
- Q19: Transmitted data stored locally are referred to as:
- Answer: Data at rest
- Q20: Digital signatures and key management are the two most important applications of:
- Answer: Public Key
0 Comments