Introduction to Cyber Security - MCQ
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What penalty does a person face for intentionally destroying or altering required computer source code?

  • Fine up to 4 lakhs
  • Imprisonment up to 1 year
  • Imprisonment up to 3 years or fine up to 2 lakhs or both (correct)
  • Imprisonment up to 4 years
  • Which type of detection method do most Intrusion Detection Systems (IDS) implementations use?

  • Event correlation
  • Intrusion prevention
  • Signature-based detection
  • Anomaly detection (correct)
  • Which encryption technique involves using a single key for both encryption and decryption?

  • Symmetric encryption (correct)
  • Asymmetric encryption
  • Tokenization
  • Hashing
  • What is the main purpose of a cryptographic hash function?

    <p>To ensure data integrity</p> Signup and view all the answers

    What does authentication verify?

    <p>User identity on a remote system</p> Signup and view all the answers

    What is the primary role of a digital signature?

    <p>To ensure the sender's authenticity</p> Signup and view all the answers

    Which section of the IT Act, 2008 addresses the use of spy cameras for capturing private moments?

    <p>Section 67</p> Signup and view all the answers

    What concept guides an organization's information security policy?

    <p>CIA Triad</p> Signup and view all the answers

    What type of encryption is primarily used in asymmetric cryptography?

    <p>Public key encryption</p> Signup and view all the answers

    Which of the following is a common function of firewalls?

    <p>Monitor network traffic</p> Signup and view all the answers

    Which type of malware is specifically designed to replicate and spread to other systems?

    <p>Worm</p> Signup and view all the answers

    What does the Data Protection Act primarily regulate?

    <p>The collection and processing of personal data</p> Signup and view all the answers

    Which of the following describes a hash function's role in data integrity?

    <p>Generates a unique fixed-size output for data verification</p> Signup and view all the answers

    Which encryption method uses the same key for both encryption and decryption?

    <p>Symmetric key encryption</p> Signup and view all the answers

    What is the primary function of a digital signature?

    <p>To verify the identity of the sender and the integrity of the message</p> Signup and view all the answers

    Which type of malware demands a ransom to restore access to the victim's system?

    <p>Ransomware</p> Signup and view all the answers

    What is a common characteristic of brute-force attacks in cryptography?

    <p>They attempt every possible combination of keys until finding the correct one.</p> Signup and view all the answers

    Which firewall function can enhance protection against potential virus attacks?

    <p>Shutting down unneeded ports.</p> Signup and view all the answers

    Which type of malware is specifically designed to capture key presses on a device?

    <p>Keylogger</p> Signup and view all the answers

    What main purpose does Section 66 of the Indian IT Act emphasize?

    <p>Cracking or illegally accessing computer systems.</p> Signup and view all the answers

    What distinguishes symmetric encryption from asymmetric encryption?

    <p>Symmetric requires a single key for both encryption and decryption, while asymmetric uses a pair of keys.</p> Signup and view all the answers

    What is the role of a nonce in cryptographic systems?

    <p>To prevent replay attacks.</p> Signup and view all the answers

    Which of the following is an example of public-key encryption?

    <p>RSA</p> Signup and view all the answers

    When was the Information Technology Act 2000 enacted in India?

    <p>17th October 2000</p> Signup and view all the answers

    Study Notes

    Introduction to Cyber Security - Multiple Choice Questions

    • OSI Model Purpose: Standardize network protocols
    • OSI Layer for Logical Addressing and Routing: Network Layer
    • Authentication using Asymmetric Crypto: Digital signature
    • ARP (Address Resolution Protocol) Purpose: Translate IP addresses to MAC addresses
    • Transport Layer Protocol for Reliable Communication: TCP (Transmission Control Protocol)
    • DNS (Domain Name System) Function: Translate domain names to IP addresses
    • Message Integrity Technique: Message Digest
    • Device Operating at Data Link Layer for MAC Address Filtering: Switch
    • Subnet Mask Function: Identify network portion of an IP address
    • Virus Scanner Primary Function: Comparing files against known virus profiles
    • Email Protocol: SMTP (Simple Mail Transfer Protocol)
    • Firewall Primary Function: Block unauthorised access
    • Malware Type Allowing Extensive System Control: RATS
    • Network Topology in Linear Sequence: Bus
    • IT Act Section for Stealing Digital Assets: Section 67
    • Default Web Browsing Protocol: HTTP
    • TCP/IP Layer for Logical Addressing (using IP): Network Layer
    • Common Cryptographic Algorithm for Secure Communication: RSA
    • DHCP (Dynamic Host Configuration Protocol) Purpose: Assign dynamic IP addresses to devices
    • Application Layer Networking Device for Filtering: Firewall
    • Cybercrime for Intentionally Destroying Code: Imprisonment up to 3 years or fine upto 2 lakhs or both
    • Cryptographic Hash Function Primary Purpose: Data integrity verification
    • Authentication: To assure the identity of user on a remote system
    • Cryptographic Technique Using Single Key: Symmetric encryption
    • Purpose of Nonce in Cryptographic Protocols : Preventing replay attacks
    • Cryptographic Attack Trying All Combinations: Brute-force attack
    • Firewall Protection Against Virus Attacks: Shut down all unnecessary ports
    • IT Act 2000 Notification Date: 17th October 2000
    • Difference between Symmetric and Asymmetric Encryption: Symmetric uses one key, and asymmetric uses two keys.
    • Malware Type of Key Logger: Spyware
    • Updated Version of IT Act 2000: IT Act, 2008
    • Primary Goal of Cybersecurity Protecting against unauthorized access and attacks
    • Strong Password Example: H@rdT0Gu3ss
    • Firewall Purpose: Block unauthorised access and control traffic
    • Antivirus Software Role: Detect and remove malicious software
    • Cybersecurity Concept for Least Privileges to Perform Job Functions: Least Privilege
    • Purpose of Biometric Authentication: Authenticating users based on unique physical characteristics
    • Meaning of Phishing: Social engineering attacks using deceptive emails or messages
    • Purpose of VPN: Providing a secure, encrypted connection over the internet
    • SIEM (Security Information and Event Management) Function: Detecting and responding to security incidents
    • Cybersecurity Measure for Regularly Updating Software: Patch Management
    • Purpose of CAPTCHA: Differentiating between humans and automated bots
    • Attack Involving Overwhelming System with Traffic: DDoS (Distributed Denial of Service)
    • Encryption Purpose in Cybersecurity: Protecting data confidentiality
    • Purpose of Intrusion Detection System (IDS): Detect malicious activity.

    Supplementary Notes

    • Not all terms were explicitly defined and some questions were more descriptive. Summarization has been done to best capture the content.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Practice MCQ Answers PDF

    Description

    Test your knowledge of key concepts in Cyber Security with this multiple-choice quiz. Covering topics such as the OSI Model, protocols, and network security mechanisms, this quiz is designed to reinforce your understanding of the foundational elements of Cyber Security.

    Use Quizgecko on...
    Browser
    Browser