Podcast
Questions and Answers
What penalty does a person face for intentionally destroying or altering required computer source code?
What penalty does a person face for intentionally destroying or altering required computer source code?
Which type of detection method do most Intrusion Detection Systems (IDS) implementations use?
Which type of detection method do most Intrusion Detection Systems (IDS) implementations use?
Which encryption technique involves using a single key for both encryption and decryption?
Which encryption technique involves using a single key for both encryption and decryption?
What is the main purpose of a cryptographic hash function?
What is the main purpose of a cryptographic hash function?
Signup and view all the answers
What does authentication verify?
What does authentication verify?
Signup and view all the answers
What is the primary role of a digital signature?
What is the primary role of a digital signature?
Signup and view all the answers
Which section of the IT Act, 2008 addresses the use of spy cameras for capturing private moments?
Which section of the IT Act, 2008 addresses the use of spy cameras for capturing private moments?
Signup and view all the answers
What concept guides an organization's information security policy?
What concept guides an organization's information security policy?
Signup and view all the answers
What type of encryption is primarily used in asymmetric cryptography?
What type of encryption is primarily used in asymmetric cryptography?
Signup and view all the answers
Which of the following is a common function of firewalls?
Which of the following is a common function of firewalls?
Signup and view all the answers
Which type of malware is specifically designed to replicate and spread to other systems?
Which type of malware is specifically designed to replicate and spread to other systems?
Signup and view all the answers
What does the Data Protection Act primarily regulate?
What does the Data Protection Act primarily regulate?
Signup and view all the answers
Which of the following describes a hash function's role in data integrity?
Which of the following describes a hash function's role in data integrity?
Signup and view all the answers
Which encryption method uses the same key for both encryption and decryption?
Which encryption method uses the same key for both encryption and decryption?
Signup and view all the answers
What is the primary function of a digital signature?
What is the primary function of a digital signature?
Signup and view all the answers
Which type of malware demands a ransom to restore access to the victim's system?
Which type of malware demands a ransom to restore access to the victim's system?
Signup and view all the answers
What is a common characteristic of brute-force attacks in cryptography?
What is a common characteristic of brute-force attacks in cryptography?
Signup and view all the answers
Which firewall function can enhance protection against potential virus attacks?
Which firewall function can enhance protection against potential virus attacks?
Signup and view all the answers
Which type of malware is specifically designed to capture key presses on a device?
Which type of malware is specifically designed to capture key presses on a device?
Signup and view all the answers
What main purpose does Section 66 of the Indian IT Act emphasize?
What main purpose does Section 66 of the Indian IT Act emphasize?
Signup and view all the answers
What distinguishes symmetric encryption from asymmetric encryption?
What distinguishes symmetric encryption from asymmetric encryption?
Signup and view all the answers
What is the role of a nonce in cryptographic systems?
What is the role of a nonce in cryptographic systems?
Signup and view all the answers
Which of the following is an example of public-key encryption?
Which of the following is an example of public-key encryption?
Signup and view all the answers
When was the Information Technology Act 2000 enacted in India?
When was the Information Technology Act 2000 enacted in India?
Signup and view all the answers
Study Notes
Introduction to Cyber Security - Multiple Choice Questions
- OSI Model Purpose: Standardize network protocols
- OSI Layer for Logical Addressing and Routing: Network Layer
- Authentication using Asymmetric Crypto: Digital signature
- ARP (Address Resolution Protocol) Purpose: Translate IP addresses to MAC addresses
- Transport Layer Protocol for Reliable Communication: TCP (Transmission Control Protocol)
- DNS (Domain Name System) Function: Translate domain names to IP addresses
- Message Integrity Technique: Message Digest
- Device Operating at Data Link Layer for MAC Address Filtering: Switch
- Subnet Mask Function: Identify network portion of an IP address
- Virus Scanner Primary Function: Comparing files against known virus profiles
- Email Protocol: SMTP (Simple Mail Transfer Protocol)
- Firewall Primary Function: Block unauthorised access
- Malware Type Allowing Extensive System Control: RATS
- Network Topology in Linear Sequence: Bus
- IT Act Section for Stealing Digital Assets: Section 67
- Default Web Browsing Protocol: HTTP
- TCP/IP Layer for Logical Addressing (using IP): Network Layer
- Common Cryptographic Algorithm for Secure Communication: RSA
- DHCP (Dynamic Host Configuration Protocol) Purpose: Assign dynamic IP addresses to devices
- Application Layer Networking Device for Filtering: Firewall
- Cybercrime for Intentionally Destroying Code: Imprisonment up to 3 years or fine upto 2 lakhs or both
- Cryptographic Hash Function Primary Purpose: Data integrity verification
- Authentication: To assure the identity of user on a remote system
- Cryptographic Technique Using Single Key: Symmetric encryption
- Purpose of Nonce in Cryptographic Protocols : Preventing replay attacks
- Cryptographic Attack Trying All Combinations: Brute-force attack
- Firewall Protection Against Virus Attacks: Shut down all unnecessary ports
- IT Act 2000 Notification Date: 17th October 2000
- Difference between Symmetric and Asymmetric Encryption: Symmetric uses one key, and asymmetric uses two keys.
- Malware Type of Key Logger: Spyware
- Updated Version of IT Act 2000: IT Act, 2008
- Primary Goal of Cybersecurity Protecting against unauthorized access and attacks
- Strong Password Example: H@rdT0Gu3ss
- Firewall Purpose: Block unauthorised access and control traffic
- Antivirus Software Role: Detect and remove malicious software
- Cybersecurity Concept for Least Privileges to Perform Job Functions: Least Privilege
- Purpose of Biometric Authentication: Authenticating users based on unique physical characteristics
- Meaning of Phishing: Social engineering attacks using deceptive emails or messages
- Purpose of VPN: Providing a secure, encrypted connection over the internet
- SIEM (Security Information and Event Management) Function: Detecting and responding to security incidents
- Cybersecurity Measure for Regularly Updating Software: Patch Management
- Purpose of CAPTCHA: Differentiating between humans and automated bots
- Attack Involving Overwhelming System with Traffic: DDoS (Distributed Denial of Service)
- Encryption Purpose in Cybersecurity: Protecting data confidentiality
- Purpose of Intrusion Detection System (IDS): Detect malicious activity.
Supplementary Notes
- Not all terms were explicitly defined and some questions were more descriptive. Summarization has been done to best capture the content.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of key concepts in Cyber Security with this multiple-choice quiz. Covering topics such as the OSI Model, protocols, and network security mechanisms, this quiz is designed to reinforce your understanding of the foundational elements of Cyber Security.