Podcast
Questions and Answers
What is the primary function of SIEM systems?
What is the primary function of SIEM systems?
Which cybersecurity measure focuses on fixing vulnerabilities in software and systems?
Which cybersecurity measure focuses on fixing vulnerabilities in software and systems?
What does CAPTCHA help accomplish in online security?
What does CAPTCHA help accomplish in online security?
What type of cyber attack is characterized by overwhelming a system to render it unavailable?
What type of cyber attack is characterized by overwhelming a system to render it unavailable?
Signup and view all the answers
What is the main role of encryption in cybersecurity?
What is the main role of encryption in cybersecurity?
Signup and view all the answers
Which protocol is specifically designed for sending and receiving emails?
Which protocol is specifically designed for sending and receiving emails?
Signup and view all the answers
What is the main role of a firewall in a network?
What is the main role of a firewall in a network?
Signup and view all the answers
Which type of malware allows hackers to gain administrative control over infected systems?
Which type of malware allows hackers to gain administrative control over infected systems?
Signup and view all the answers
Which network topology connects all devices in a linear form?
Which network topology connects all devices in a linear form?
Signup and view all the answers
Under which section of the IT Act is stealing digital assets classified as a cybercrime?
Under which section of the IT Act is stealing digital assets classified as a cybercrime?
Signup and view all the answers
What protocol is typically used for browsing the web?
What protocol is typically used for browsing the web?
Signup and view all the answers
In the TCP/IP model, which layer handles logical addressing with IP addresses?
In the TCP/IP model, which layer handles logical addressing with IP addresses?
Signup and view all the answers
What is the function of DHCP?
What is the function of DHCP?
Signup and view all the answers
What is the primary purpose of the OSI model?
What is the primary purpose of the OSI model?
Signup and view all the answers
Which layer of the OSI model is responsible for logical addressing and routing?
Which layer of the OSI model is responsible for logical addressing and routing?
Signup and view all the answers
The authentication to be affected by the use of asymmetric cryptography and hash function is known as:
The authentication to be affected by the use of asymmetric cryptography and hash function is known as:
Signup and view all the answers
What is the purpose of ARP (Address Resolution Protocol)?
What is the purpose of ARP (Address Resolution Protocol)?
Signup and view all the answers
Which protocol operates at the Transport Layer and provides reliable, connection-oriented communication?
Which protocol operates at the Transport Layer and provides reliable, connection-oriented communication?
Signup and view all the answers
What is the purpose of DNS (Domain Name System)?
What is the purpose of DNS (Domain Name System)?
Signup and view all the answers
Which of these is a technique that is used to verify a message’s integrity?
Which of these is a technique that is used to verify a message’s integrity?
Signup and view all the answers
What is the primary way a virus scanner works?
What is the primary way a virus scanner works?
Signup and view all the answers
Which key is primarily used to establish secure communication in asymmetric encryption?
Which key is primarily used to establish secure communication in asymmetric encryption?
Signup and view all the answers
What is the main function of a hash function in cryptography?
What is the main function of a hash function in cryptography?
Signup and view all the answers
Which section of the Indian IT Act addresses unauthorized access to computers?
Which section of the Indian IT Act addresses unauthorized access to computers?
Signup and view all the answers
Which encryption algorithm is widely employed for securing data over the internet?
Which encryption algorithm is widely employed for securing data over the internet?
Signup and view all the answers
What cybercrime does Section 66 of the Indian IT Act primarily pertain to?
What cybercrime does Section 66 of the Indian IT Act primarily pertain to?
Signup and view all the answers
What role does a nonce serve in cryptographic systems?
What role does a nonce serve in cryptographic systems?
Signup and view all the answers
Which type of attack involves systematically trying every possible key until the correct one is found?
Which type of attack involves systematically trying every possible key until the correct one is found?
Signup and view all the answers
What preventive measure can firewalls use to counteract virus attacks effectively?
What preventive measure can firewalls use to counteract virus attacks effectively?
Signup and view all the answers
What is the penalty for intentionally destroying or altering required computer source code?
What is the penalty for intentionally destroying or altering required computer source code?
Signup and view all the answers
Which detection method is commonly used by most Intrusion Detection System (IDS) software?
Which detection method is commonly used by most Intrusion Detection System (IDS) software?
Signup and view all the answers
Which protocol is used for delivering data packets without guaranteeing delivery?
Which protocol is used for delivering data packets without guaranteeing delivery?
Signup and view all the answers
What is the primary function of cryptography?
What is the primary function of cryptography?
Signup and view all the answers
What is the main purpose of a cryptographic hash function?
What is the main purpose of a cryptographic hash function?
Signup and view all the answers
What does authentication primarily provide in a system?
What does authentication primarily provide in a system?
Signup and view all the answers
Which cryptographic technique involves using a single key for both encryption and decryption?
Which cryptographic technique involves using a single key for both encryption and decryption?
Signup and view all the answers
What section of the IT Act, 2008 deals with using spy cameras to capture private parts of a person?
What section of the IT Act, 2008 deals with using spy cameras to capture private parts of a person?
Signup and view all the answers
What is the updated version of the IT Act, 2000?
What is the updated version of the IT Act, 2000?
Signup and view all the answers
What is the primary goal of cybersecurity?
What is the primary goal of cybersecurity?
Signup and view all the answers
Which of the following is an example of a strong password?
Which of the following is an example of a strong password?
Signup and view all the answers
What is the purpose of a firewall in cybersecurity?
What is the purpose of a firewall in cybersecurity?
Signup and view all the answers
What does antivirus software primarily do?
What does antivirus software primarily do?
Signup and view all the answers
Which cybersecurity concept involves providing the least amount of privilege necessary to perform a job function?
Which cybersecurity concept involves providing the least amount of privilege necessary to perform a job function?
Signup and view all the answers
What is the purpose of biometric authentication in cybersecurity?
What is the purpose of biometric authentication in cybersecurity?
Signup and view all the answers
What does the term 'phishing' refer to in the context of cybersecurity?
What does the term 'phishing' refer to in the context of cybersecurity?
Signup and view all the answers
Child pornography is an offence under section ________.
Child pornography is an offence under section ________.
Signup and view all the answers
What is the purpose of a VPN (Virtual Private Network) in cybersecurity?
What is the purpose of a VPN (Virtual Private Network) in cybersecurity?
Signup and view all the answers
What is the primary function of SIEM (Security Information and Event Management)
systems?
What is the primary function of SIEM (Security Information and Event Management) systems?
Signup and view all the answers
What does the acronym IDS stand for in the context of cybersecurity?
What does the acronym IDS stand for in the context of cybersecurity?
Signup and view all the answers
Which cybersecurity principle involves isolating different parts of a network to contain
potential security incidents?
Which cybersecurity principle involves isolating different parts of a network to contain potential security incidents?
Signup and view all the answers
A key logger is what type of malware?
A key logger is what type of malware?
Signup and view all the answers
The Information Technology Act 2000 is an Act of the Indian Parliament notified on
The Information Technology Act 2000 is an Act of the Indian Parliament notified on
Signup and view all the answers
What is the key difference between symmetric and asymmetric encryption?
What is the key difference between symmetric and asymmetric encryption?
Signup and view all the answers
Authentication is _________
Authentication is _________
Signup and view all the answers
This is the concept for guiding information security policy within a corporation, firm, or
organisation. What exactly is “this” in this context?
This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?
Signup and view all the answers
What is the purpose of a digital signature in cryptography?
What is the purpose of a digital signature in cryptography?
Signup and view all the answers
In public-key cryptography, which key is used for encryption?
In public-key cryptography, which key is used for encryption?
Signup and view all the answers
Which device operates at the Data Link Layer and filters traffic based on MAC addresses?
Which device operates at the Data Link Layer and filters traffic based on MAC addresses?
Signup and view all the answers
Study Notes
Introduction to Cyber Security - Multiple Choice Questions
- OSI Model Purpose: Standardize network protocols
- OSI Layer for Logical Addressing: Network Layer
- Authentication Method: Digital signature (using asymmetric cryptography and hash functions)
- ARP Purpose: Translates IP addresses to MAC addresses
- Reliable Transport Layer Protocol: TCP (Transmission Control Protocol)
- DNS Purpose: Translates domain names to IP addresses
- Data Integrity Verification Technique: Message Digest
- MAC Address Filtering Device: Switch
- Subnet Mask Purpose: Identifies the network portion of an IP address
- Virus Scanner Method: Comparing files against a list of known virus profiles
- Email Protocol: SMTP (Simple Mail Transfer Protocol)
- Firewall Primary Function: Blocking unauthorized access
- Malware Type for Administrative Control: RATS
- Network Topology for Linear Sequence: Bus
- Cybercrime Section for Digital Asset Theft: Section 65
- Default Web Browsing Protocol: HTTP
- Logical Addressing Layer (TCP/IP): Network Layer
- Common Cryptographic Algorithm for Secure Communication (HTTPS): RSA
- Dynamic Host Configuration Protocol Purpose: Assigning dynamic IP addresses to devices
- Application-Layer Filtering Device: Firewall
- Unauthorized Data Destruction/Alteration Penalty: Imprisonment up to 3 years or fine up to 2 lakhs or both
- Cryptographic Hash Function Purpose: Data integrity verification
- Authentication Purpose: To assure user identity on a remote system
- Single Key Encryption/Decryption Technique: Symmetric encryption
- Purpose of Nonce in Cryptographic Protocols: Preventing replay attacks
- Cryptographic Attack by Trying All Possible Key Combinations: Brute-force attack
- Firewall Protection Against Viruses: Shut down all unneeded ports
- Cybercrime Act Year: 2000
- Biometric Authentication Purpose: Authenticating users based on unique physical characteristics
- Phishing Definition: Social engineering attacks using deceptive emails or messages
- VPN Purpose: Providing a secure, encrypted connection over the internet
- SIEM System Function: Detecting and responding to security incidents
- Cybersecurity Measure for Vulnerability Updates: Patch Management
- Purpose of CAPTCHA: Differentiating between humans and automated bots
- Attack Involving Flooding a System with Traffic: DDoS (Distributed Denial of Service)
- Encryption Purpose: Protecting data confidentiality
- IDS Acronym: Intrusion Detection System
- Network Isolation Principle: Network Segmentation
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the fundamental concepts of cyber security with this multiple-choice quiz. Covering topics such as the OSI model, authentication methods, and network protocols, this quiz is perfect for beginners and enthusiasts alike.