Cyber Security Questions and Answers | Cyber Security MCQs and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
1 How can cookies be used to mitigate cross-site scripting?
A Cookies can be coded like a program to intercept script attacks.
B Cookies store an exact mirror copy of all a users web activity.
C Cookies allow for cookie-based user authentication.
D They can't. Cookies only store user information.

Answer: Cookies allow for cookie-based user authentication.
2 Which of the following uses asymmetric cryptography ?
A VoIP
B SSL
C Both VoIP and SSL
D None of these

Answer: Both VoIP and SSL
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
3 Which of the following is not a VALID type of firewall?
A Application-level gateways
B Circuit-level gateways
C Proxy Server Gateways
D Packet filters

Answer: Proxy Server Gateways
4 What is the less secure AES encryption mode?
A CFB
B OCB
C ECB
D CBC

Answer: CBC
5 What is a method to fend off a Sockstress attack?
A Do nothing. It will pass on its own.
B Prepare a retaliatory DDOS attack
C Black-listing access to TCP services on critical systems
D White-listing access to TCP services on critical systems.

Answer: White-listing access to TCP services on critical systems.
6 Which of the following HTTP method is considered insecure ?
A POST
B DELETE
C TRACE
D GET

Answer: TRACE
7 Which of the following represents a cryptographic key that is generated for each execution of a key establishment process ?
A Private key transport key
B Public signature verification key
C Private ephemeral key agreement key
D Public authentication key

Answer: Private ephemeral key agreement key
8 What does the Linux kernal use to sandbox running programs?
A Linux doesn't sandbox because it is impervious to any and all cyber attacks
B Linux uses a layered system of user authentication to perform sandbox-like functions.
C seccomp, or Secure Computing Mode
D Linux drives are fully encrypted, thus they don't need sandboxing.

Answer: seccomp, or Secure Computing Mode
9 Which of the following keys are the private keys of asymmetric (public) key pairs that are used only once to establish one or more keys ?
A Public ephemeral key agreement key
B Asymmetric random number generation keys
C Symmetric random number generation keys
D Private ephemeral key agreement key

Answer: Private ephemeral key agreement key
10 What does a cryptographic key do within the Internet Layer?
A It specifies how encrypted data is transferred and to whom.
B It specifies how transferred information is converted into cyphertext.
C It converts it into encrypted language.
D It is the specialized dataset that is able to decrypt cyphertext.

Answer: It specifies how transferred information is converted into cyphertext
11 What is the difference between a worm and virus?
A A worm does not replicate itself like a virus does, but rather moves from computer to computer
B A virus infects files, while a worm eats them
C A worm is a virus created for a very specific purpose
D Unlike a virus, a worm does not need to attach itself to a program to spread.

Answer: Unlike a virus, a worm does not need to attach itself to a program to spread.
12 Which of the following represents a cryptographic key that is intended to be used for a long period of time?
A Private key transport
B key Public authentication
C signature verification key
D Private static key agreement key

Answer: Private static key agreement key
13 Which of the following is a VALID ephemeral key?
A Asymmetric ephemeral random number generation keys
B Public ephemeral verification key
C Symmetric ephemeral random number generation keys
D Public ephemeral key agreement key

Answer: Public ephemeral key agreement key
14 Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
A Public Key Infrastructure
B Virtual Key Infrastructure
C Private Key Infrastructure
D All of the given options are correct

Answer: Public Key Infrastructure
15 Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
A Symmetric random number generation keys
B Asymmetric random number generation keys
C Symmetric key wrapping key
D Public signature verification key

Answer: Symmetric key wrapping key
16 Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
A Symmetric random number generation keys
B Asymmetric random number generation keys
C Symmetric key wrapping key
D Public signature verification key

Answer: Symmetric key wrapping key
17 Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
A Virus
B Spyware
C Fraudtool
D Malware

Answer: Fraudtool
18 In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections? session layer application layer
A presentation layer
B Both session and presentation layer
C session layer
D application layer

Answer: application layer
19 Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?
A Public signature verification key
B Private signature key
C Public key transport key
D Private key transport key

Answer: Public key transport key
20 Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?
A Private signature key
B Private key transport key
C Public signature verification key
D Public authentication key

Answer: Private key transport key
Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series