Introduction to Cyber Security - MCQ
24 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What penalty does a person face for intentionally destroying or altering required computer source code?

  • Fine up to 4 lakhs
  • Imprisonment up to 1 year
  • Imprisonment up to 3 years or fine up to 2 lakhs or both (correct)
  • Imprisonment up to 4 years
  • Which type of detection method do most Intrusion Detection Systems (IDS) implementations use?

  • Event correlation
  • Intrusion prevention
  • Signature-based detection
  • Anomaly detection (correct)
  • Which encryption technique involves using a single key for both encryption and decryption?

  • Symmetric encryption (correct)
  • Asymmetric encryption
  • Tokenization
  • Hashing
  • What is the main purpose of a cryptographic hash function?

    <p>To ensure data integrity (D)</p> Signup and view all the answers

    What does authentication verify?

    <p>User identity on a remote system (D)</p> Signup and view all the answers

    What is the primary role of a digital signature?

    <p>To ensure the sender's authenticity (B)</p> Signup and view all the answers

    Which section of the IT Act, 2008 addresses the use of spy cameras for capturing private moments?

    <p>Section 67 (D)</p> Signup and view all the answers

    What concept guides an organization's information security policy?

    <p>CIA Triad (A)</p> Signup and view all the answers

    What type of encryption is primarily used in asymmetric cryptography?

    <p>Public key encryption (A)</p> Signup and view all the answers

    Which of the following is a common function of firewalls?

    <p>Monitor network traffic (C)</p> Signup and view all the answers

    Which type of malware is specifically designed to replicate and spread to other systems?

    <p>Worm (B)</p> Signup and view all the answers

    What does the Data Protection Act primarily regulate?

    <p>The collection and processing of personal data (A)</p> Signup and view all the answers

    Which of the following describes a hash function's role in data integrity?

    <p>Generates a unique fixed-size output for data verification (D)</p> Signup and view all the answers

    Which encryption method uses the same key for both encryption and decryption?

    <p>Symmetric key encryption (A)</p> Signup and view all the answers

    What is the primary function of a digital signature?

    <p>To verify the identity of the sender and the integrity of the message (D)</p> Signup and view all the answers

    Which type of malware demands a ransom to restore access to the victim's system?

    <p>Ransomware (B)</p> Signup and view all the answers

    What is a common characteristic of brute-force attacks in cryptography?

    <p>They attempt every possible combination of keys until finding the correct one. (A)</p> Signup and view all the answers

    Which firewall function can enhance protection against potential virus attacks?

    <p>Shutting down unneeded ports. (B)</p> Signup and view all the answers

    Which type of malware is specifically designed to capture key presses on a device?

    <p>Keylogger (B)</p> Signup and view all the answers

    What main purpose does Section 66 of the Indian IT Act emphasize?

    <p>Cracking or illegally accessing computer systems. (C)</p> Signup and view all the answers

    What distinguishes symmetric encryption from asymmetric encryption?

    <p>Symmetric requires a single key for both encryption and decryption, while asymmetric uses a pair of keys. (C)</p> Signup and view all the answers

    What is the role of a nonce in cryptographic systems?

    <p>To prevent replay attacks. (C)</p> Signup and view all the answers

    Which of the following is an example of public-key encryption?

    <p>RSA (C)</p> Signup and view all the answers

    When was the Information Technology Act 2000 enacted in India?

    <p>17th October 2000 (A)</p> Signup and view all the answers

    Flashcards

    Computer Source Code Destruction Penalty

    Intentional destruction or alteration of legally protected computer source code carries a penalty of imprisonment up to 3 years, a fine up to 2 lakhs, or both.

    IDS Software Method

    Most Intrusion Detection System (IDS) implementations use anomaly detection to identify malicious activity.

    Protocol for Best-Effort Delivery

    User Datagram Protocol (UDP) is the protocol responsible for sending data packets without guaranteeing delivery in a best-effort manner.

    Cryptography's Primary Purpose

    Cryptography primarily aims to secure communication by transforming data into a secret code.

    Signup and view all the flashcards

    Cryptographic Hash Function Purpose

    A cryptographic hash function's primary purpose is verifying data integrity.

    Signup and view all the flashcards

    Authentication Definition

    Authentication is the process of confirming a user's identity on a remote system.

    Signup and view all the flashcards

    Symmetric Encryption Key Use

    Symmetric encryption uses a single key for both encryption and decryption.

    Signup and view all the flashcards

    IT Act Section for Spy Cameras

    Using spy cameras in public places to capture private parts falls under Section 67 of the IT Act, 2008.

    Signup and view all the flashcards

    Hash Function in Cryptography

    A function that transforms data of any size into a fixed-size output, ensuring data integrity.

    Signup and view all the flashcards

    Symmetric Encryption

    Uses the same key for encryption and decryption.

    Signup and view all the flashcards

    Asymmetric Encryption

    Uses two different keys for encryption and decryption: public and private keys.

    Signup and view all the flashcards

    Brute-force attack

    A method of cracking a code by systematically trying all possible combinations.

    Signup and view all the flashcards

    Firewall

    A security system designed to prevent unauthorized access to a computer network.

    Signup and view all the flashcards

    Private Key

    A secret key used in asymmetric cryptography, used for decryption.

    Signup and view all the flashcards

    Public Key

    A key used in asymmetric cryptography, used for encryption, publicly available.

    Signup and view all the flashcards

    Nonce

    A random value included in cryptographic communications to prevent replay attacks.

    Signup and view all the flashcards

    OSI Model's Purpose

    The Open Systems Interconnection (OSI) model defines standardized network protocols to ensure communication between different systems.

    Signup and view all the flashcards

    Network Layer's Role

    The Network Layer of the OSI model handles logical addressing (IP addresses) and routing data packets across networks.

    Signup and view all the flashcards

    Digital Signature for Authentication

    A digital signature uses asymmetric cryptography and hashing to verify the authenticity and integrity of a message or document.

    Signup and view all the flashcards

    ARP's Function

    Address Resolution Protocol (ARP) translates IP addresses (logical addresses) to MAC addresses (physical addresses) for communication on a local network.

    Signup and view all the flashcards

    TCP: Reliable Communication

    Transmission Control Protocol (TCP) operates at the Transport Layer of the OSI model, providing reliable, connection-oriented data transfer.

    Signup and view all the flashcards

    DNS: Domain Name Translation

    Domain Name System (DNS) translates domain names (like 'google.com') into IP addresses (numerical addresses), making it easy to access websites.

    Signup and view all the flashcards

    Message Digest for Integrity

    A message digest is a unique, fixed-length hash value that verifies the integrity of a message by detecting any alterations.

    Signup and view all the flashcards

    Switch: MAC Address Filtering

    A network switch operates at the Data Link Layer and filters traffic based on MAC addresses, allowing efficient communication between connected devices.

    Signup and view all the flashcards

    Study Notes

    Introduction to Cyber Security - Multiple Choice Questions

    • OSI Model Purpose: Standardize network protocols
    • OSI Layer for Logical Addressing and Routing: Network Layer
    • Authentication using Asymmetric Crypto: Digital signature
    • ARP (Address Resolution Protocol) Purpose: Translate IP addresses to MAC addresses
    • Transport Layer Protocol for Reliable Communication: TCP (Transmission Control Protocol)
    • DNS (Domain Name System) Function: Translate domain names to IP addresses
    • Message Integrity Technique: Message Digest
    • Device Operating at Data Link Layer for MAC Address Filtering: Switch
    • Subnet Mask Function: Identify network portion of an IP address
    • Virus Scanner Primary Function: Comparing files against known virus profiles
    • Email Protocol: SMTP (Simple Mail Transfer Protocol)
    • Firewall Primary Function: Block unauthorised access
    • Malware Type Allowing Extensive System Control: RATS
    • Network Topology in Linear Sequence: Bus
    • IT Act Section for Stealing Digital Assets: Section 67
    • Default Web Browsing Protocol: HTTP
    • TCP/IP Layer for Logical Addressing (using IP): Network Layer
    • Common Cryptographic Algorithm for Secure Communication: RSA
    • DHCP (Dynamic Host Configuration Protocol) Purpose: Assign dynamic IP addresses to devices
    • Application Layer Networking Device for Filtering: Firewall
    • Cybercrime for Intentionally Destroying Code: Imprisonment up to 3 years or fine upto 2 lakhs or both
    • Cryptographic Hash Function Primary Purpose: Data integrity verification
    • Authentication: To assure the identity of user on a remote system
    • Cryptographic Technique Using Single Key: Symmetric encryption
    • Purpose of Nonce in Cryptographic Protocols : Preventing replay attacks
    • Cryptographic Attack Trying All Combinations: Brute-force attack
    • Firewall Protection Against Virus Attacks: Shut down all unnecessary ports
    • IT Act 2000 Notification Date: 17th October 2000
    • Difference between Symmetric and Asymmetric Encryption: Symmetric uses one key, and asymmetric uses two keys.
    • Malware Type of Key Logger: Spyware
    • Updated Version of IT Act 2000: IT Act, 2008
    • Primary Goal of Cybersecurity Protecting against unauthorized access and attacks
    • Strong Password Example: H@rdT0Gu3ss
    • Firewall Purpose: Block unauthorised access and control traffic
    • Antivirus Software Role: Detect and remove malicious software
    • Cybersecurity Concept for Least Privileges to Perform Job Functions: Least Privilege
    • Purpose of Biometric Authentication: Authenticating users based on unique physical characteristics
    • Meaning of Phishing: Social engineering attacks using deceptive emails or messages
    • Purpose of VPN: Providing a secure, encrypted connection over the internet
    • SIEM (Security Information and Event Management) Function: Detecting and responding to security incidents
    • Cybersecurity Measure for Regularly Updating Software: Patch Management
    • Purpose of CAPTCHA: Differentiating between humans and automated bots
    • Attack Involving Overwhelming System with Traffic: DDoS (Distributed Denial of Service)
    • Encryption Purpose in Cybersecurity: Protecting data confidentiality
    • Purpose of Intrusion Detection System (IDS): Detect malicious activity.

    Supplementary Notes

    • Not all terms were explicitly defined and some questions were more descriptive. Summarization has been done to best capture the content.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Practice MCQ Answers PDF

    Description

    Test your knowledge of key concepts in Cyber Security with this multiple-choice quiz. Covering topics such as the OSI Model, protocols, and network security mechanisms, this quiz is designed to reinforce your understanding of the foundational elements of Cyber Security.

    More Like This

    Use Quizgecko on...
    Browser
    Browser