Introduction to Cyber Security Quiz
58 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of SIEM systems?

  • Blocking harmful internet traffic
  • Encrypting sensitive data
  • Detecting and responding to security incidents (correct)
  • Managing user access control
  • Which cybersecurity measure focuses on fixing vulnerabilities in software and systems?

  • Regular Security Auditing
  • Intrusion Detection Systems
  • Patch Management (correct)
  • User Authentication Protocols
  • What does CAPTCHA help accomplish in online security?

  • Preventing unauthorized access
  • Differentiating between humans and automated bots (correct)
  • Encrypting user credentials
  • Blocking potential malware from user inputs
  • What type of cyber attack is characterized by overwhelming a system to render it unavailable?

    <p>DDoS (Distributed Denial of Service)</p> Signup and view all the answers

    What is the main role of encryption in cybersecurity?

    <p>Protecting data confidentiality</p> Signup and view all the answers

    Which protocol is specifically designed for sending and receiving emails?

    <p>SMTP (Simple Mail Transfer Protocol)</p> Signup and view all the answers

    What is the main role of a firewall in a network?

    <p>Block unauthorized access</p> Signup and view all the answers

    Which type of malware allows hackers to gain administrative control over infected systems?

    <p>RATs</p> Signup and view all the answers

    Which network topology connects all devices in a linear form?

    <p>Bus</p> Signup and view all the answers

    Under which section of the IT Act is stealing digital assets classified as a cybercrime?

    <p>Section 65</p> Signup and view all the answers

    What protocol is typically used for browsing the web?

    <p>HTTP</p> Signup and view all the answers

    In the TCP/IP model, which layer handles logical addressing with IP addresses?

    <p>Network Layer</p> Signup and view all the answers

    What is the function of DHCP?

    <p>Assign dynamic IP addresses to devices on a network</p> Signup and view all the answers

    What is the primary purpose of the OSI model?

    <p>Standardize network protocols</p> Signup and view all the answers

    Which layer of the OSI model is responsible for logical addressing and routing?

    <p>Network Layer</p> Signup and view all the answers

    The authentication to be affected by the use of asymmetric cryptography and hash function is known as:

    <p>Digital signature</p> Signup and view all the answers

    What is the purpose of ARP (Address Resolution Protocol)?

    <p>Translate IP addresses to MAC addresses</p> Signup and view all the answers

    Which protocol operates at the Transport Layer and provides reliable, connection-oriented communication?

    <p>TCP (Transmission Control Protocol)</p> Signup and view all the answers

    What is the purpose of DNS (Domain Name System)?

    <p>Translate domain names to IP addresses</p> Signup and view all the answers

    Which of these is a technique that is used to verify a message’s integrity?

    <p>Message Digest</p> Signup and view all the answers

    What is the primary way a virus scanner works?

    <p>By comparing files against a list of known virus profiles</p> Signup and view all the answers

    Which key is primarily used to establish secure communication in asymmetric encryption?

    <p>Public key</p> Signup and view all the answers

    What is the main function of a hash function in cryptography?

    <p>Ensuring data integrity</p> Signup and view all the answers

    Which section of the Indian IT Act addresses unauthorized access to computers?

    <p>Section 66</p> Signup and view all the answers

    Which encryption algorithm is widely employed for securing data over the internet?

    <p>AES</p> Signup and view all the answers

    What cybercrime does Section 66 of the Indian IT Act primarily pertain to?

    <p>Unauthorized system access</p> Signup and view all the answers

    What role does a nonce serve in cryptographic systems?

    <p>Preventing replay attacks</p> Signup and view all the answers

    Which type of attack involves systematically trying every possible key until the correct one is found?

    <p>Brute-force attack</p> Signup and view all the answers

    What preventive measure can firewalls use to counteract virus attacks effectively?

    <p>Shut down all unneeded ports</p> Signup and view all the answers

    What is the penalty for intentionally destroying or altering required computer source code?

    <p>Imprisonment up to 3 years or fine up to 2 lakhs or both</p> Signup and view all the answers

    Which detection method is commonly used by most Intrusion Detection System (IDS) software?

    <p>Anomaly detection</p> Signup and view all the answers

    Which protocol is used for delivering data packets without guaranteeing delivery?

    <p>UDP</p> Signup and view all the answers

    What is the primary function of cryptography?

    <p>Securing communication by converting data into a secret code</p> Signup and view all the answers

    What is the main purpose of a cryptographic hash function?

    <p>Data integrity verification</p> Signup and view all the answers

    What does authentication primarily provide in a system?

    <p>To assure the identity of user on a remote system</p> Signup and view all the answers

    Which cryptographic technique involves using a single key for both encryption and decryption?

    <p>Symmetric encryption</p> Signup and view all the answers

    What section of the IT Act, 2008 deals with using spy cameras to capture private parts of a person?

    <p>Section 67</p> Signup and view all the answers

    What is the updated version of the IT Act, 2000?

    <p>IT Act, 2008</p> Signup and view all the answers

    What is the primary goal of cybersecurity?

    <p>Protecting against unauthorized access and attacks</p> Signup and view all the answers

    Which of the following is an example of a strong password?

    <p>H@rdT0Gu3ss</p> Signup and view all the answers

    What is the purpose of a firewall in cybersecurity?

    <p>Block unauthorized access and control traffic</p> Signup and view all the answers

    What does antivirus software primarily do?

    <p>Detect and remove malicious software</p> Signup and view all the answers

    Which cybersecurity concept involves providing the least amount of privilege necessary to perform a job function?

    <p>Least Privilege</p> Signup and view all the answers

    What is the purpose of biometric authentication in cybersecurity?

    <p>Authenticating users based on unique physical characteristics</p> Signup and view all the answers

    What does the term 'phishing' refer to in the context of cybersecurity?

    <p>Social engineering attacks using deceptive emails or messages</p> Signup and view all the answers

    Child pornography is an offence under section ________.

    <p>67 B</p> Signup and view all the answers

    What is the purpose of a VPN (Virtual Private Network) in cybersecurity?

    <p>Providing a secure, encrypted connection over the internet</p> Signup and view all the answers

    What is the primary function of SIEM (Security Information and Event Management) systems?

    <p>Detecting and responding to security incidents</p> Signup and view all the answers

    What does the acronym IDS stand for in the context of cybersecurity?

    <p>Intrusion Detection System</p> Signup and view all the answers

    Which cybersecurity principle involves isolating different parts of a network to contain potential security incidents?

    <p>Network Segmentation</p> Signup and view all the answers

    A key logger is what type of malware?

    <p>Spyware</p> Signup and view all the answers

    The Information Technology Act 2000 is an Act of the Indian Parliament notified on

    <p>17th October 2000</p> Signup and view all the answers

    What is the key difference between symmetric and asymmetric encryption?

    <p>Symmetric uses one key, and asymmetric uses two keys.</p> Signup and view all the answers

    Authentication is _________

    <p>To assure the identity of user on a remote system</p> Signup and view all the answers

    This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?

    <p>CIA Triad</p> Signup and view all the answers

    What is the purpose of a digital signature in cryptography?

    <p>Authenticate the sender of a message</p> Signup and view all the answers

    In public-key cryptography, which key is used for encryption?

    <p>Public key</p> Signup and view all the answers

    Which device operates at the Data Link Layer and filters traffic based on MAC addresses?

    <p>Switch</p> Signup and view all the answers

    Study Notes

    Introduction to Cyber Security - Multiple Choice Questions

    • OSI Model Purpose: Standardize network protocols
    • OSI Layer for Logical Addressing: Network Layer
    • Authentication Method: Digital signature (using asymmetric cryptography and hash functions)
    • ARP Purpose: Translates IP addresses to MAC addresses
    • Reliable Transport Layer Protocol: TCP (Transmission Control Protocol)
    • DNS Purpose: Translates domain names to IP addresses
    • Data Integrity Verification Technique: Message Digest
    • MAC Address Filtering Device: Switch
    • Subnet Mask Purpose: Identifies the network portion of an IP address
    • Virus Scanner Method: Comparing files against a list of known virus profiles
    • Email Protocol: SMTP (Simple Mail Transfer Protocol)
    • Firewall Primary Function: Blocking unauthorized access
    • Malware Type for Administrative Control: RATS
    • Network Topology for Linear Sequence: Bus
    • Cybercrime Section for Digital Asset Theft: Section 65
    • Default Web Browsing Protocol: HTTP
    • Logical Addressing Layer (TCP/IP): Network Layer
    • Common Cryptographic Algorithm for Secure Communication (HTTPS): RSA
    • Dynamic Host Configuration Protocol Purpose: Assigning dynamic IP addresses to devices
    • Application-Layer Filtering Device: Firewall
    • Unauthorized Data Destruction/Alteration Penalty: Imprisonment up to 3 years or fine up to 2 lakhs or both
    • Cryptographic Hash Function Purpose: Data integrity verification
    • Authentication Purpose: To assure user identity on a remote system
    • Single Key Encryption/Decryption Technique: Symmetric encryption
    • Purpose of Nonce in Cryptographic Protocols: Preventing replay attacks
    • Cryptographic Attack by Trying All Possible Key Combinations: Brute-force attack
    • Firewall Protection Against Viruses: Shut down all unneeded ports
    • Cybercrime Act Year: 2000
    • Biometric Authentication Purpose: Authenticating users based on unique physical characteristics
    • Phishing Definition: Social engineering attacks using deceptive emails or messages
    • VPN Purpose: Providing a secure, encrypted connection over the internet
    • SIEM System Function: Detecting and responding to security incidents
    • Cybersecurity Measure for Vulnerability Updates: Patch Management
    • Purpose of CAPTCHA: Differentiating between humans and automated bots
    • Attack Involving Flooding a System with Traffic: DDoS (Distributed Denial of Service)
    • Encryption Purpose: Protecting data confidentiality
    • IDS Acronym: Intrusion Detection System
    • Network Isolation Principle: Network Segmentation

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Practice MCQ Answers PDF

    Description

    Test your knowledge on the fundamental concepts of cyber security with this multiple-choice quiz. Covering topics such as the OSI model, authentication methods, and network protocols, this quiz is perfect for beginners and enthusiasts alike.

    Use Quizgecko on...
    Browser
    Browser