Introduction to Cyber Security Quiz
58 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of SIEM systems?

  • Blocking harmful internet traffic
  • Encrypting sensitive data
  • Detecting and responding to security incidents (correct)
  • Managing user access control
  • Which cybersecurity measure focuses on fixing vulnerabilities in software and systems?

  • Regular Security Auditing
  • Intrusion Detection Systems
  • Patch Management (correct)
  • User Authentication Protocols
  • What does CAPTCHA help accomplish in online security?

  • Preventing unauthorized access
  • Differentiating between humans and automated bots (correct)
  • Encrypting user credentials
  • Blocking potential malware from user inputs
  • What type of cyber attack is characterized by overwhelming a system to render it unavailable?

    <p>DDoS (Distributed Denial of Service) (B)</p> Signup and view all the answers

    What is the main role of encryption in cybersecurity?

    <p>Protecting data confidentiality (B)</p> Signup and view all the answers

    Which protocol is specifically designed for sending and receiving emails?

    <p>SMTP (Simple Mail Transfer Protocol) (D)</p> Signup and view all the answers

    What is the main role of a firewall in a network?

    <p>Block unauthorized access (D)</p> Signup and view all the answers

    Which type of malware allows hackers to gain administrative control over infected systems?

    <p>RATs (B)</p> Signup and view all the answers

    Which network topology connects all devices in a linear form?

    <p>Bus (D)</p> Signup and view all the answers

    Under which section of the IT Act is stealing digital assets classified as a cybercrime?

    <p>Section 65 (B)</p> Signup and view all the answers

    What protocol is typically used for browsing the web?

    <p>HTTP (A)</p> Signup and view all the answers

    In the TCP/IP model, which layer handles logical addressing with IP addresses?

    <p>Network Layer (C)</p> Signup and view all the answers

    What is the function of DHCP?

    <p>Assign dynamic IP addresses to devices on a network (B)</p> Signup and view all the answers

    What is the primary purpose of the OSI model?

    <p>Standardize network protocols (A)</p> Signup and view all the answers

    Which layer of the OSI model is responsible for logical addressing and routing?

    <p>Network Layer (D)</p> Signup and view all the answers

    The authentication to be affected by the use of asymmetric cryptography and hash function is known as:

    <p>Digital signature (D)</p> Signup and view all the answers

    What is the purpose of ARP (Address Resolution Protocol)?

    <p>Translate IP addresses to MAC addresses (C)</p> Signup and view all the answers

    Which protocol operates at the Transport Layer and provides reliable, connection-oriented communication?

    <p>TCP (Transmission Control Protocol) (A)</p> Signup and view all the answers

    What is the purpose of DNS (Domain Name System)?

    <p>Translate domain names to IP addresses (C)</p> Signup and view all the answers

    Which of these is a technique that is used to verify a message’s integrity?

    <p>Message Digest (C)</p> Signup and view all the answers

    What is the primary way a virus scanner works?

    <p>By comparing files against a list of known virus profiles (D)</p> Signup and view all the answers

    Which key is primarily used to establish secure communication in asymmetric encryption?

    <p>Public key (A)</p> Signup and view all the answers

    What is the main function of a hash function in cryptography?

    <p>Ensuring data integrity (A)</p> Signup and view all the answers

    Which section of the Indian IT Act addresses unauthorized access to computers?

    <p>Section 66 (B)</p> Signup and view all the answers

    Which encryption algorithm is widely employed for securing data over the internet?

    <p>AES (A)</p> Signup and view all the answers

    What cybercrime does Section 66 of the Indian IT Act primarily pertain to?

    <p>Unauthorized system access (A)</p> Signup and view all the answers

    What role does a nonce serve in cryptographic systems?

    <p>Preventing replay attacks (D)</p> Signup and view all the answers

    Which type of attack involves systematically trying every possible key until the correct one is found?

    <p>Brute-force attack (B)</p> Signup and view all the answers

    What preventive measure can firewalls use to counteract virus attacks effectively?

    <p>Shut down all unneeded ports (D)</p> Signup and view all the answers

    What is the penalty for intentionally destroying or altering required computer source code?

    <p>Imprisonment up to 3 years or fine up to 2 lakhs or both (A)</p> Signup and view all the answers

    Which detection method is commonly used by most Intrusion Detection System (IDS) software?

    <p>Anomaly detection (D)</p> Signup and view all the answers

    Which protocol is used for delivering data packets without guaranteeing delivery?

    <p>UDP (B)</p> Signup and view all the answers

    What is the primary function of cryptography?

    <p>Securing communication by converting data into a secret code (D)</p> Signup and view all the answers

    What is the main purpose of a cryptographic hash function?

    <p>Data integrity verification (C)</p> Signup and view all the answers

    What does authentication primarily provide in a system?

    <p>To assure the identity of user on a remote system (B)</p> Signup and view all the answers

    Which cryptographic technique involves using a single key for both encryption and decryption?

    <p>Symmetric encryption (D)</p> Signup and view all the answers

    What section of the IT Act, 2008 deals with using spy cameras to capture private parts of a person?

    <p>Section 67 (C)</p> Signup and view all the answers

    What is the updated version of the IT Act, 2000?

    <p>IT Act, 2008 (B)</p> Signup and view all the answers

    What is the primary goal of cybersecurity?

    <p>Protecting against unauthorized access and attacks (C)</p> Signup and view all the answers

    Which of the following is an example of a strong password?

    <p>H@rdT0Gu3ss (C)</p> Signup and view all the answers

    What is the purpose of a firewall in cybersecurity?

    <p>Block unauthorized access and control traffic (A)</p> Signup and view all the answers

    What does antivirus software primarily do?

    <p>Detect and remove malicious software (A)</p> Signup and view all the answers

    Which cybersecurity concept involves providing the least amount of privilege necessary to perform a job function?

    <p>Least Privilege (D)</p> Signup and view all the answers

    What is the purpose of biometric authentication in cybersecurity?

    <p>Authenticating users based on unique physical characteristics (D)</p> Signup and view all the answers

    What does the term 'phishing' refer to in the context of cybersecurity?

    <p>Social engineering attacks using deceptive emails or messages (C)</p> Signup and view all the answers

    Child pornography is an offence under section ________.

    <p>67 B (D)</p> Signup and view all the answers

    What is the purpose of a VPN (Virtual Private Network) in cybersecurity?

    <p>Providing a secure, encrypted connection over the internet (B)</p> Signup and view all the answers

    What is the primary function of SIEM (Security Information and Event Management) systems?

    <p>Detecting and responding to security incidents (D)</p> Signup and view all the answers

    What does the acronym IDS stand for in the context of cybersecurity?

    <p>Intrusion Detection System (A)</p> Signup and view all the answers

    Which cybersecurity principle involves isolating different parts of a network to contain potential security incidents?

    <p>Network Segmentation (C)</p> Signup and view all the answers

    A key logger is what type of malware?

    <p>Spyware (D)</p> Signup and view all the answers

    The Information Technology Act 2000 is an Act of the Indian Parliament notified on

    <p>17th October 2000 (C)</p> Signup and view all the answers

    What is the key difference between symmetric and asymmetric encryption?

    <p>Symmetric uses one key, and asymmetric uses two keys. (C)</p> Signup and view all the answers

    Authentication is _________

    <p>To assure the identity of user on a remote system (B)</p> Signup and view all the answers

    This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?

    <p>CIA Triad (B)</p> Signup and view all the answers

    What is the purpose of a digital signature in cryptography?

    <p>Authenticate the sender of a message (D)</p> Signup and view all the answers

    In public-key cryptography, which key is used for encryption?

    <p>Public key (D)</p> Signup and view all the answers

    Which device operates at the Data Link Layer and filters traffic based on MAC addresses?

    <p>Switch (B)</p> Signup and view all the answers

    Flashcards

    OSI Model Purpose

    Standardizes network protocols, ensuring different hardware and software can communicate.

    Network Layer Function

    Handles logical addressing (like IP addresses) and routing of data packets.

    Digital Signature Purpose

    Verifies a message's integrity and sender's identity using asymmetric cryptography and hash functions.

    ARP Function

    Translates IP addresses to MAC addresses (physical hardware addresses).

    Signup and view all the flashcards

    TCP Protocol Role

    Reliable, connection-based transport layer protocol.

    Signup and view all the flashcards

    DNS Function

    Translates human-readable domain names (like www.example.com) to IP addresses.

    Signup and view all the flashcards

    Subnet Mask's Role

    Identifies the network portion of an IP address.

    Signup and view all the flashcards

    Virus Scanner Technique

    Compares files against a database of known viruses.

    Signup and view all the flashcards

    What protocol is used for email?

    SMTP (Simple Mail Transfer Protocol) is responsible for sending and receiving emails.

    Signup and view all the flashcards

    Firewall's function

    A firewall's main purpose is to block unauthorized access to a computer network.

    Signup and view all the flashcards

    What does a RAT do?

    A Remote Access Trojan (RAT) allows hackers to control an infected system, giving them administrative privileges.

    Signup and view all the flashcards

    Bus topology

    In a bus topology, all devices are connected in a single linear sequence.

    Signup and view all the flashcards

    IT Act offense

    Stealing digital assets or information is considered a cybercrime under Section 65 of the IT Act.

    Signup and view all the flashcards

    Default web browsing protocol

    HTTP (Hypertext Transfer Protocol) is the standard protocol used for browsing websites.

    Signup and view all the flashcards

    HTTPS encryption

    AES (Advanced Encryption Standard) is a common cryptographic algorithm used for secure communication over the internet, like in HTTPS.

    Signup and view all the flashcards

    Data Integrity

    The assurance that data remains unchanged and accurate, ensuring it hasn't been tampered with.

    Signup and view all the flashcards

    Cryptographic Hash Function

    A mathematical function that transforms data into a fixed-length 'fingerprint' (hash). Any change to the original data results in a different hash.

    Signup and view all the flashcards

    Symmetric Encryption

    A cryptographic method using a single key for both encrypting and decrypting data.

    Signup and view all the flashcards

    Authentication

    Verifying the true identity of a user accessing a system, ensuring they are who they claim to be.

    Signup and view all the flashcards

    CIA Triad

    A core information security concept involving Confidentiality, Integrity, and Availability. It guides security policy within organizations.

    Signup and view all the flashcards

    Public-key Cryptography

    A method using two keys: a public key for encryption and a private key for decryption.

    Signup and view all the flashcards

    Digital Signature

    A cryptographic technique verifying both the sender's identity and the message's integrity.

    Signup and view all the flashcards

    UDP (User Datagram Protocol)

    A connectionless protocol used for sending data packets without guaranteeing delivery or order.

    Signup and view all the flashcards

    SIEM System Function

    A SIEM (Security Information and Event Management) system collects and analyzes security data from various sources, detecting and responding to security incidents in real-time.

    Signup and view all the flashcards

    Patch Management

    Patch management involves regularly updating software and systems to fix known vulnerabilities and security flaws.

    Signup and view all the flashcards

    CAPTCHA Purpose

    A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a security measure that differentiates humans from automated bots, preventing automated attacks like spam.

    Signup and view all the flashcards

    DDoS Attack

    A Distributed Denial of Service (DDoS) attack overwhelms a system or network with a massive amount of traffic, making it unavailable to genuine users.

    Signup and view all the flashcards

    Encryption's Role

    Encryption converts data into an unreadable format, protecting its confidentiality by ensuring only authorized individuals with the decryption key can access it.

    Signup and view all the flashcards

    Public Key

    A cryptographic key used for encrypting data. Anyone can have access to the public key, but only the corresponding private key can decrypt the data.

    Signup and view all the flashcards

    Hash Function Purpose

    A mathematical function that converts data of any size into a unique fixed-length string, called a hash, ensuring data integrity.

    Signup and view all the flashcards

    Section 66 of the Indian IT Act

    This section of the Act addresses offenses related to illegally hacking into a computer system, including unauthorized access and data theft.

    Signup and view all the flashcards

    AES Algorithm

    A powerful symmetric-key encryption algorithm widely used for securing data transmission over the internet. It uses a single key for both encryption and decryption.

    Signup and view all the flashcards

    Nonce Purpose

    A unique, randomly generated value used in cryptography to prevent replay attacks by ensuring that a message cannot be reused.

    Signup and view all the flashcards

    Brute-Force Attack

    A cryptographic attack method that tries every possible combination of a key to decrypt encrypted data. This can take a very long time.

    Signup and view all the flashcards

    Symmetric vs. Asymmetric Encryption

    Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses two keys: a public key for encryption and a private key for decryption.

    Signup and view all the flashcards

    IT Act, 2008

    This is the updated version of the Indian IT Act, 2000. It includes amendments and changes to address emerging technologies and cybercrime threats.

    Signup and view all the flashcards

    Cybersecurity Goal

    The key objective of cybersecurity is to protect data and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

    Signup and view all the flashcards

    Strong Password

    It should be difficult to guess, containing a mix of uppercase and lowercase letters, numbers, and symbols.

    Signup and view all the flashcards

    Firewall's Role

    A firewall acts like a gatekeeper, inspecting incoming and outgoing network traffic, blocking unauthorized access and controlling communication.

    Signup and view all the flashcards

    Antivirus Software's Purpose

    This software scans and detects malicious software like viruses, worms, and Trojans, preventing them from infecting your system.

    Signup and view all the flashcards

    Child Pornography Offense

    Under Section 67 of the IT Act, possessing, distributing, or creating child pornography is a serious offense.

    Signup and view all the flashcards

    Least Privilege

    This cybersecurity principle focuses on granting only the necessary permissions to users to perform their assigned tasks, reducing potential security risks.

    Signup and view all the flashcards

    Biometric Authentication

    This technique verifies user identity based on unique biological characteristics like fingerprints, facial recognition, or iris scans.

    Signup and view all the flashcards

    Phishing

    A social engineering technique used to trick users into revealing sensitive information like login credentials, passwords, or financial details by impersonating trustworthy sources.

    Signup and view all the flashcards

    VPN (Virtual Private Network)

    A VPN creates a secure encrypted connection between your device and a server on the internet, protecting your online activities and data from eavesdroppers.

    Signup and view all the flashcards

    Study Notes

    Introduction to Cyber Security - Multiple Choice Questions

    • OSI Model Purpose: Standardize network protocols
    • OSI Layer for Logical Addressing: Network Layer
    • Authentication Method: Digital signature (using asymmetric cryptography and hash functions)
    • ARP Purpose: Translates IP addresses to MAC addresses
    • Reliable Transport Layer Protocol: TCP (Transmission Control Protocol)
    • DNS Purpose: Translates domain names to IP addresses
    • Data Integrity Verification Technique: Message Digest
    • MAC Address Filtering Device: Switch
    • Subnet Mask Purpose: Identifies the network portion of an IP address
    • Virus Scanner Method: Comparing files against a list of known virus profiles
    • Email Protocol: SMTP (Simple Mail Transfer Protocol)
    • Firewall Primary Function: Blocking unauthorized access
    • Malware Type for Administrative Control: RATS
    • Network Topology for Linear Sequence: Bus
    • Cybercrime Section for Digital Asset Theft: Section 65
    • Default Web Browsing Protocol: HTTP
    • Logical Addressing Layer (TCP/IP): Network Layer
    • Common Cryptographic Algorithm for Secure Communication (HTTPS): RSA
    • Dynamic Host Configuration Protocol Purpose: Assigning dynamic IP addresses to devices
    • Application-Layer Filtering Device: Firewall
    • Unauthorized Data Destruction/Alteration Penalty: Imprisonment up to 3 years or fine up to 2 lakhs or both
    • Cryptographic Hash Function Purpose: Data integrity verification
    • Authentication Purpose: To assure user identity on a remote system
    • Single Key Encryption/Decryption Technique: Symmetric encryption
    • Purpose of Nonce in Cryptographic Protocols: Preventing replay attacks
    • Cryptographic Attack by Trying All Possible Key Combinations: Brute-force attack
    • Firewall Protection Against Viruses: Shut down all unneeded ports
    • Cybercrime Act Year: 2000
    • Biometric Authentication Purpose: Authenticating users based on unique physical characteristics
    • Phishing Definition: Social engineering attacks using deceptive emails or messages
    • VPN Purpose: Providing a secure, encrypted connection over the internet
    • SIEM System Function: Detecting and responding to security incidents
    • Cybersecurity Measure for Vulnerability Updates: Patch Management
    • Purpose of CAPTCHA: Differentiating between humans and automated bots
    • Attack Involving Flooding a System with Traffic: DDoS (Distributed Denial of Service)
    • Encryption Purpose: Protecting data confidentiality
    • IDS Acronym: Intrusion Detection System
    • Network Isolation Principle: Network Segmentation

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Practice MCQ Answers PDF

    Description

    Test your knowledge on the fundamental concepts of cyber security with this multiple-choice quiz. Covering topics such as the OSI model, authentication methods, and network protocols, this quiz is perfect for beginners and enthusiasts alike.

    More Like This

    Use Quizgecko on...
    Browser
    Browser