Cyber-Security-Quiz-7
Cyber-Security-Quiz-7

Cyber Security is a primary concern for businesses of all sizes. If your organization has a large number of employees and the data stored on your systems is valuable and confidential, you need to make sure your cyber security is up-to-date and that your employees are aware of how to protect your business. Creating a cyber security quiz for your employees and potential employees will help with this. In this blog, we’ll take a look at some of the answers to your frequently asked questions about cyber security, in the form of a short quiz.

Let us know some cyber security quiz questions and their answers.

Many users choose a password that is too short or too easy to guess.

Select one:
True
False

Presenting or generating authentication information that corroborates the binding between the entity and the identifier is the _.

Select one:
a. identification step
b. verification step
c. authentication step
d. corroboration step

A smart card contains an entire microprocessor.

Select one:
True
False

Identification is the means of establishing the validity of a claimed identity provided by a user.

Select one:
True
False

The technique for developing an effective and efficient proactive password checker based on
rejecting words on a list is based on the use of a …… filter.

Fill the blank with an appropriate answer

To counter threats to remote user authentication, systems generally rely on some form of _ protocol.

Select one:
a. eavesdropping
b. Trojan horse
c. challenge-response
d. denial-of-service

The …….. is the pattern formed by veins beneath the retinal surface.

Fill the blank with an appropriate answer

A ………. authentication system attempts to authenticate an individual based on his or her unique physical characteristics.

Fill the blank with an appropriate answer

Enrollment creates an association between a user and the user’s biometric characteristics.

Select one:
True
False

Depending on the application, user authentication on a biometric system involves either verification or identification.

Select one:
True
False

__ allows an issuer to access regional and national networks that connect point of sale devices and bank teller machines worldwide.

Select one:
a. EFT
b. POS
c. BTM
d. ATF

Identifiers should be assigned carefully because authenticated identities are the basis for other security services.

Select one:
True
False

Recognition by fingerprint, retina, and face are examples of __.

Select one:
a. face recognition
b. dynamic biometrics
c. static biometrics
d. token authentication

…………, in the context of passwords, refers to an adversary’s attempt to learn the password by observing the user, finding a written copy of the password, or some similar attack that involves the physical proximity of the user and adversary.

Fill the blank with an appropriate answer

A ……… attack attempts to disable a user authentication service by flooding the service with numerous authentication attempts.

Fill the blank with an appropriate answer

User authentication is the basis for most types of access control and for user accountability.

Select one:
True
False

__ defines user authentication as “the process of verifying an identity claimed by or for a system entity”.

Select one:
a. RFC 4949
b. RFC 2298
c. RFC 2493
d. RFC 2328

A __ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

Select one:
a. client attack
b. eavesdropping attack
c. host attack
d. Trojan horse attack

Objects that a user possesses for the purpose of user authentication are called ………..

Fill the blank with an appropriate answer

In a biometric scheme, some physical characteristic of the individual is mapped into a digital representation.

Select one:
True
False

Answers

  1. True
  2. b
  3. True
  4. False
  5. bloom
  6. c
  7. retinal pattern
  8. Biometric
  9. True
  10. True
  11. a
  12. True
  13. c
  14. Eavesdropping
  15. denial-of-service
  16. True
  17. a
  18. a
  19. Tokens
  20. True