cyber-security-quiz-8
cyber-security-quiz-8

The need for cyber security has never been greater. This is especially true if you are a small business with a limited IT budget. In this blog, we are going to take a look around the important topic of cyber security with a fun and interactive quiz to test how well you understand cyber security. This cyber security quiz will allow you to test your cyber security knowledge and see if you can answer these questions correctly.

Let’s get started with cyber security quiz questions with an appropriate answers.

_ is a tool used to automatically identify potentially vulnerable programs.

Select one:
a. Slamming
b. Sledding
c. Fuzzing
d. All the above

Subject attributes, object attributes, and environment attributes are the three types of attributes in the __ model.

Select one:
a. DSD
b. RBAC
c. ABAC
d. SSD

A principal element of an identity management system is _.

Select one:
a. workflow automation
b. delegated administration
c. authentication
d. all of the above

A _ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy.

Select one:
a. standard of conduct
b. unlawful activity prohibited
c. company rights
d. business use only

__ software is a centralized logging software package similar to, but much more complex than, syslog.

Select one:
a. NetScan
b. McAfee
c. IPConfig
d. SIEM

The ideal solution to the threat of malware is __.

Select one:
a. identification
b. removal
c. detection
d. prevention

Cryptographic systems are generically classified by _.

Select one:
a. the type of operations used for transforming plaintext to ciphertext
b. the number of keys used
c. the way in which the plaintext is processed
d. all of the above

Public-key encryption was developed in the late __.

Select one:
a. 1950s
b. 1970s
c. 1960s
d. 1980s

__ is an organization that receives the encrypted data from a data owner and makes them available for distribution to clients.

Select one:
a. User
b. Client
c. Data owner
d. Server

The _ field in the outer IP header indicates whether the association is an AH or ESP security association.

Select one:
a. protocol identifier
b. security parameter index
c. IP destination address
d. sequence path counter

Combined one byte at a time with the plaintext stream using the XOR operation, a __ is the output of the pseudorandom bit generator.

Select one:
a. keystream
b. digital signature
c. secure hash
d. message authentication code

__ is the identification of data that exceed a particular baseline value.

Select one:
a. Anomaly detection
b. Real-time analysis
c. Thresholding
d. All of the above

A restricted area within close proximity of a security interest has a classification of __.

Select one:
a. exclusion
b. controlled
c. limited
d. unrestricted

The purpose of __ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined.

Select one:
a. establishing the context
b. control
c. risk avoidance
d. combining

The principal attraction of __ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.

Select one:
a. ECC
b. MD5
c. Diffie-Hellman
d. none of the above

__ is the recommended technique for wireless network security.

Select one:
a. Using encryption
b. Using anti-virus and anti-spyware software
c. Turning off identifier broadcasting
d. All of the above

A benefit of IPsec is __.

Select one:
a. that it is below the transport layer and transparent to applications
b. there is no need to revoke keying material when users leave the organization
c. it can provide security for individual users if needed
d. all of the above

__ looks for deviation from standards set forth in RFCs.

Select one:
a. Statistical anomaly
b. Protocol anomaly
c. Pattern matching
d. Traffic anomaly

Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _ process.

Select one:
a. management
b. security awareness and training
c. maintenance
d. all of the above

The DSS makes use of the _ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).

Select one:
a. HMAC
b. XOR
c. RSA
d. SHA-1

Answers

  1. c
  2. c
  3. d
  4. c
  5. d
  6. d
  7. d
  8. b
  9. d
  10. a
  11. a
  12. c
  13. c
  14. a
  15. a
  16. d
  17. d
  18. b
  19. a
  20. d