Introduction to Cyber Security Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of SIEM systems?

  • Blocking harmful internet traffic
  • Encrypting sensitive data
  • Detecting and responding to security incidents (correct)
  • Managing user access control

Which cybersecurity measure focuses on fixing vulnerabilities in software and systems?

  • Regular Security Auditing
  • Intrusion Detection Systems
  • Patch Management (correct)
  • User Authentication Protocols

What does CAPTCHA help accomplish in online security?

  • Preventing unauthorized access
  • Differentiating between humans and automated bots (correct)
  • Encrypting user credentials
  • Blocking potential malware from user inputs

What type of cyber attack is characterized by overwhelming a system to render it unavailable?

<p>DDoS (Distributed Denial of Service) (B)</p> Signup and view all the answers

What is the main role of encryption in cybersecurity?

<p>Protecting data confidentiality (B)</p> Signup and view all the answers

Which protocol is specifically designed for sending and receiving emails?

<p>SMTP (Simple Mail Transfer Protocol) (D)</p> Signup and view all the answers

What is the main role of a firewall in a network?

<p>Block unauthorized access (D)</p> Signup and view all the answers

Which type of malware allows hackers to gain administrative control over infected systems?

<p>RATs (B)</p> Signup and view all the answers

Which network topology connects all devices in a linear form?

<p>Bus (D)</p> Signup and view all the answers

Under which section of the IT Act is stealing digital assets classified as a cybercrime?

<p>Section 65 (B)</p> Signup and view all the answers

What protocol is typically used for browsing the web?

<p>HTTP (A)</p> Signup and view all the answers

In the TCP/IP model, which layer handles logical addressing with IP addresses?

<p>Network Layer (C)</p> Signup and view all the answers

What is the function of DHCP?

<p>Assign dynamic IP addresses to devices on a network (B)</p> Signup and view all the answers

What is the primary purpose of the OSI model?

<p>Standardize network protocols (A)</p> Signup and view all the answers

Which layer of the OSI model is responsible for logical addressing and routing?

<p>Network Layer (D)</p> Signup and view all the answers

The authentication to be affected by the use of asymmetric cryptography and hash function is known as:

<p>Digital signature (D)</p> Signup and view all the answers

What is the purpose of ARP (Address Resolution Protocol)?

<p>Translate IP addresses to MAC addresses (C)</p> Signup and view all the answers

Which protocol operates at the Transport Layer and provides reliable, connection-oriented communication?

<p>TCP (Transmission Control Protocol) (A)</p> Signup and view all the answers

What is the purpose of DNS (Domain Name System)?

<p>Translate domain names to IP addresses (C)</p> Signup and view all the answers

Which of these is a technique that is used to verify a message’s integrity?

<p>Message Digest (C)</p> Signup and view all the answers

What is the primary way a virus scanner works?

<p>By comparing files against a list of known virus profiles (D)</p> Signup and view all the answers

Which key is primarily used to establish secure communication in asymmetric encryption?

<p>Public key (A)</p> Signup and view all the answers

What is the main function of a hash function in cryptography?

<p>Ensuring data integrity (A)</p> Signup and view all the answers

Which section of the Indian IT Act addresses unauthorized access to computers?

<p>Section 66 (B)</p> Signup and view all the answers

Which encryption algorithm is widely employed for securing data over the internet?

<p>AES (A)</p> Signup and view all the answers

What cybercrime does Section 66 of the Indian IT Act primarily pertain to?

<p>Unauthorized system access (A)</p> Signup and view all the answers

What role does a nonce serve in cryptographic systems?

<p>Preventing replay attacks (D)</p> Signup and view all the answers

Which type of attack involves systematically trying every possible key until the correct one is found?

<p>Brute-force attack (B)</p> Signup and view all the answers

What preventive measure can firewalls use to counteract virus attacks effectively?

<p>Shut down all unneeded ports (D)</p> Signup and view all the answers

What is the penalty for intentionally destroying or altering required computer source code?

<p>Imprisonment up to 3 years or fine up to 2 lakhs or both (A)</p> Signup and view all the answers

Which detection method is commonly used by most Intrusion Detection System (IDS) software?

<p>Anomaly detection (D)</p> Signup and view all the answers

Which protocol is used for delivering data packets without guaranteeing delivery?

<p>UDP (B)</p> Signup and view all the answers

What is the primary function of cryptography?

<p>Securing communication by converting data into a secret code (D)</p> Signup and view all the answers

What is the main purpose of a cryptographic hash function?

<p>Data integrity verification (C)</p> Signup and view all the answers

What does authentication primarily provide in a system?

<p>To assure the identity of user on a remote system (B)</p> Signup and view all the answers

Which cryptographic technique involves using a single key for both encryption and decryption?

<p>Symmetric encryption (D)</p> Signup and view all the answers

What section of the IT Act, 2008 deals with using spy cameras to capture private parts of a person?

<p>Section 67 (C)</p> Signup and view all the answers

What is the updated version of the IT Act, 2000?

<p>IT Act, 2008 (B)</p> Signup and view all the answers

What is the primary goal of cybersecurity?

<p>Protecting against unauthorized access and attacks (C)</p> Signup and view all the answers

Which of the following is an example of a strong password?

<p>H@rdT0Gu3ss (C)</p> Signup and view all the answers

What is the purpose of a firewall in cybersecurity?

<p>Block unauthorized access and control traffic (A)</p> Signup and view all the answers

What does antivirus software primarily do?

<p>Detect and remove malicious software (A)</p> Signup and view all the answers

Which cybersecurity concept involves providing the least amount of privilege necessary to perform a job function?

<p>Least Privilege (D)</p> Signup and view all the answers

What is the purpose of biometric authentication in cybersecurity?

<p>Authenticating users based on unique physical characteristics (D)</p> Signup and view all the answers

What does the term 'phishing' refer to in the context of cybersecurity?

<p>Social engineering attacks using deceptive emails or messages (C)</p> Signup and view all the answers

Child pornography is an offence under section ________.

<p>67 B (D)</p> Signup and view all the answers

What is the purpose of a VPN (Virtual Private Network) in cybersecurity?

<p>Providing a secure, encrypted connection over the internet (B)</p> Signup and view all the answers

What is the primary function of SIEM (Security Information and Event Management) systems?

<p>Detecting and responding to security incidents (D)</p> Signup and view all the answers

What does the acronym IDS stand for in the context of cybersecurity?

<p>Intrusion Detection System (A)</p> Signup and view all the answers

Which cybersecurity principle involves isolating different parts of a network to contain potential security incidents?

<p>Network Segmentation (C)</p> Signup and view all the answers

A key logger is what type of malware?

<p>Spyware (D)</p> Signup and view all the answers

The Information Technology Act 2000 is an Act of the Indian Parliament notified on

<p>17th October 2000 (C)</p> Signup and view all the answers

What is the key difference between symmetric and asymmetric encryption?

<p>Symmetric uses one key, and asymmetric uses two keys. (C)</p> Signup and view all the answers

Authentication is _________

<p>To assure the identity of user on a remote system (B)</p> Signup and view all the answers

This is the concept for guiding information security policy within a corporation, firm, or organisation. What exactly is “this” in this context?

<p>CIA Triad (B)</p> Signup and view all the answers

What is the purpose of a digital signature in cryptography?

<p>Authenticate the sender of a message (D)</p> Signup and view all the answers

In public-key cryptography, which key is used for encryption?

<p>Public key (D)</p> Signup and view all the answers

Which device operates at the Data Link Layer and filters traffic based on MAC addresses?

<p>Switch (B)</p> Signup and view all the answers

Flashcards

OSI Model Purpose

Standardizes network protocols, ensuring different hardware and software can communicate.

Network Layer Function

Handles logical addressing (like IP addresses) and routing of data packets.

Digital Signature Purpose

Verifies a message's integrity and sender's identity using asymmetric cryptography and hash functions.

ARP Function

Translates IP addresses to MAC addresses (physical hardware addresses).

Signup and view all the flashcards

TCP Protocol Role

Reliable, connection-based transport layer protocol.

Signup and view all the flashcards

DNS Function

Translates human-readable domain names (like www.example.com) to IP addresses.

Signup and view all the flashcards

Subnet Mask's Role

Identifies the network portion of an IP address.

Signup and view all the flashcards

Virus Scanner Technique

Compares files against a database of known viruses.

Signup and view all the flashcards

What protocol is used for email?

SMTP (Simple Mail Transfer Protocol) is responsible for sending and receiving emails.

Signup and view all the flashcards

Firewall's function

A firewall's main purpose is to block unauthorized access to a computer network.

Signup and view all the flashcards

What does a RAT do?

A Remote Access Trojan (RAT) allows hackers to control an infected system, giving them administrative privileges.

Signup and view all the flashcards

Bus topology

In a bus topology, all devices are connected in a single linear sequence.

Signup and view all the flashcards

IT Act offense

Stealing digital assets or information is considered a cybercrime under Section 65 of the IT Act.

Signup and view all the flashcards

Default web browsing protocol

HTTP (Hypertext Transfer Protocol) is the standard protocol used for browsing websites.

Signup and view all the flashcards

HTTPS encryption

AES (Advanced Encryption Standard) is a common cryptographic algorithm used for secure communication over the internet, like in HTTPS.

Signup and view all the flashcards

Data Integrity

The assurance that data remains unchanged and accurate, ensuring it hasn't been tampered with.

Signup and view all the flashcards

Cryptographic Hash Function

A mathematical function that transforms data into a fixed-length 'fingerprint' (hash). Any change to the original data results in a different hash.

Signup and view all the flashcards

Symmetric Encryption

A cryptographic method using a single key for both encrypting and decrypting data.

Signup and view all the flashcards

Authentication

Verifying the true identity of a user accessing a system, ensuring they are who they claim to be.

Signup and view all the flashcards

CIA Triad

A core information security concept involving Confidentiality, Integrity, and Availability. It guides security policy within organizations.

Signup and view all the flashcards

Public-key Cryptography

A method using two keys: a public key for encryption and a private key for decryption.

Signup and view all the flashcards

Digital Signature

A cryptographic technique verifying both the sender's identity and the message's integrity.

Signup and view all the flashcards

UDP (User Datagram Protocol)

A connectionless protocol used for sending data packets without guaranteeing delivery or order.

Signup and view all the flashcards

SIEM System Function

A SIEM (Security Information and Event Management) system collects and analyzes security data from various sources, detecting and responding to security incidents in real-time.

Signup and view all the flashcards

Patch Management

Patch management involves regularly updating software and systems to fix known vulnerabilities and security flaws.

Signup and view all the flashcards

CAPTCHA Purpose

A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a security measure that differentiates humans from automated bots, preventing automated attacks like spam.

Signup and view all the flashcards

DDoS Attack

A Distributed Denial of Service (DDoS) attack overwhelms a system or network with a massive amount of traffic, making it unavailable to genuine users.

Signup and view all the flashcards

Encryption's Role

Encryption converts data into an unreadable format, protecting its confidentiality by ensuring only authorized individuals with the decryption key can access it.

Signup and view all the flashcards

Public Key

A cryptographic key used for encrypting data. Anyone can have access to the public key, but only the corresponding private key can decrypt the data.

Signup and view all the flashcards

Hash Function Purpose

A mathematical function that converts data of any size into a unique fixed-length string, called a hash, ensuring data integrity.

Signup and view all the flashcards

Section 66 of the Indian IT Act

This section of the Act addresses offenses related to illegally hacking into a computer system, including unauthorized access and data theft.

Signup and view all the flashcards

AES Algorithm

A powerful symmetric-key encryption algorithm widely used for securing data transmission over the internet. It uses a single key for both encryption and decryption.

Signup and view all the flashcards

Nonce Purpose

A unique, randomly generated value used in cryptography to prevent replay attacks by ensuring that a message cannot be reused.

Signup and view all the flashcards

Brute-Force Attack

A cryptographic attack method that tries every possible combination of a key to decrypt encrypted data. This can take a very long time.

Signup and view all the flashcards

Symmetric vs. Asymmetric Encryption

Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses two keys: a public key for encryption and a private key for decryption.

Signup and view all the flashcards

IT Act, 2008

This is the updated version of the Indian IT Act, 2000. It includes amendments and changes to address emerging technologies and cybercrime threats.

Signup and view all the flashcards

Cybersecurity Goal

The key objective of cybersecurity is to protect data and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Signup and view all the flashcards

Strong Password

It should be difficult to guess, containing a mix of uppercase and lowercase letters, numbers, and symbols.

Signup and view all the flashcards

Firewall's Role

A firewall acts like a gatekeeper, inspecting incoming and outgoing network traffic, blocking unauthorized access and controlling communication.

Signup and view all the flashcards

Antivirus Software's Purpose

This software scans and detects malicious software like viruses, worms, and Trojans, preventing them from infecting your system.

Signup and view all the flashcards

Child Pornography Offense

Under Section 67 of the IT Act, possessing, distributing, or creating child pornography is a serious offense.

Signup and view all the flashcards

Least Privilege

This cybersecurity principle focuses on granting only the necessary permissions to users to perform their assigned tasks, reducing potential security risks.

Signup and view all the flashcards

Biometric Authentication

This technique verifies user identity based on unique biological characteristics like fingerprints, facial recognition, or iris scans.

Signup and view all the flashcards

Phishing

A social engineering technique used to trick users into revealing sensitive information like login credentials, passwords, or financial details by impersonating trustworthy sources.

Signup and view all the flashcards

VPN (Virtual Private Network)

A VPN creates a secure encrypted connection between your device and a server on the internet, protecting your online activities and data from eavesdroppers.

Signup and view all the flashcards

Study Notes

Introduction to Cyber Security - Multiple Choice Questions

  • OSI Model Purpose: Standardize network protocols
  • OSI Layer for Logical Addressing: Network Layer
  • Authentication Method: Digital signature (using asymmetric cryptography and hash functions)
  • ARP Purpose: Translates IP addresses to MAC addresses
  • Reliable Transport Layer Protocol: TCP (Transmission Control Protocol)
  • DNS Purpose: Translates domain names to IP addresses
  • Data Integrity Verification Technique: Message Digest
  • MAC Address Filtering Device: Switch
  • Subnet Mask Purpose: Identifies the network portion of an IP address
  • Virus Scanner Method: Comparing files against a list of known virus profiles
  • Email Protocol: SMTP (Simple Mail Transfer Protocol)
  • Firewall Primary Function: Blocking unauthorized access
  • Malware Type for Administrative Control: RATS
  • Network Topology for Linear Sequence: Bus
  • Cybercrime Section for Digital Asset Theft: Section 65
  • Default Web Browsing Protocol: HTTP
  • Logical Addressing Layer (TCP/IP): Network Layer
  • Common Cryptographic Algorithm for Secure Communication (HTTPS): RSA
  • Dynamic Host Configuration Protocol Purpose: Assigning dynamic IP addresses to devices
  • Application-Layer Filtering Device: Firewall
  • Unauthorized Data Destruction/Alteration Penalty: Imprisonment up to 3 years or fine up to 2 lakhs or both
  • Cryptographic Hash Function Purpose: Data integrity verification
  • Authentication Purpose: To assure user identity on a remote system
  • Single Key Encryption/Decryption Technique: Symmetric encryption
  • Purpose of Nonce in Cryptographic Protocols: Preventing replay attacks
  • Cryptographic Attack by Trying All Possible Key Combinations: Brute-force attack
  • Firewall Protection Against Viruses: Shut down all unneeded ports
  • Cybercrime Act Year: 2000
  • Biometric Authentication Purpose: Authenticating users based on unique physical characteristics
  • Phishing Definition: Social engineering attacks using deceptive emails or messages
  • VPN Purpose: Providing a secure, encrypted connection over the internet
  • SIEM System Function: Detecting and responding to security incidents
  • Cybersecurity Measure for Vulnerability Updates: Patch Management
  • Purpose of CAPTCHA: Differentiating between humans and automated bots
  • Attack Involving Flooding a System with Traffic: DDoS (Distributed Denial of Service)
  • Encryption Purpose: Protecting data confidentiality
  • IDS Acronym: Intrusion Detection System
  • Network Isolation Principle: Network Segmentation

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Practice MCQ Answers PDF

More Like This

Use Quizgecko on...
Browser
Browser