Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
9 views6 pages

Security Multiple-Choice Questions

The document contains several multiple-choice questions on topics related to cybersecurity such as confidentiality, integrity, threats, malware, and encryption algorithms.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views6 pages

Security Multiple-Choice Questions

The document contains several multiple-choice questions on topics related to cybersecurity such as confidentiality, integrity, threats, malware, and encryption algorithms.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

MCQ on Computer Security

IT Security Quiz – Part 1

In computer security, _______ means that active computer systems cannot


can only be modified by authorized persons.

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity

In cybersecurity, _______ means that the information contained in a system


computer systems are only accessible in read mode by authorized individuals.

A. Confidentiality
B. Integrity
C. Availability
D. Authenticity

3. What are the types of threats to the security of a computer system or a network?

A. Interruption
B. Interception
C. C Modification
D. Creation
E. Fabrication

4. Which of the following programs is a standalone malicious program that does not require
no other program?

A. Trap Door
B. Trojan Horse
C. Virus
D. See

5. The _______ is a code that recognizes a special input sequence or is triggered by


an unlikely sequence of events.

A. Trap door
B. Trojan Horse
C. Logical bomb
D. Virus

The _______ is a code embedded in a legitimate program set to "explode".


when certain conditions are met.

A. Trap door
B. Trojan Horse
C. Logical bomb
D. Virus
7. Which of the following malicious programs does not replicate automatically?

A. Trojan Horse
B. Virus
C. See
D. Zombie

________ is a form of virus explicitly designed to evade detection by software.


antivirus.

A. Stealth Virus
B. Polymorphic virus
C. Virus parasite
D. Macro virus

9. Indicate whether the following expression is true or false:


A worm executes a copy of itself on another system.

A. True
B. False

10. Indicate whether the following statement is true or false:


A worm sends a copy of itself to other systems.

A. True
B. False

IT Security Quiz - Part 2

1. ______ is a program that can infect other programs by modifying them. This
Modification includes a copy of the viral program, which can then infect other programs.

To see
B. Virus
C. Zombie
D. Trap doors

2. ______ are used in denial of service attacks, usually against websites.


targeted.

A. See
B. Virus
C. Zombie
D. Trojan Horse

3. The type of encoding in which the manipulation of bit streams is done without regard to the
The meaning of bits is called _________?

A. Destination coding
B. Entropy coding
C. Source Coding
D. Differential coding

4. The protocol used to secure emails?

A. POP
B. PGP
C. SNMP
D. HTTP

The art of breaking down numbers is known as ____?

A. Cryptology
B. Cryptography
C. Cryptanalysis
D. Encryption

Which of the following statements is correct?

A. Character - represented by a complement


B. Character - represented by the complement of two
C. Character - represented by Unicode
D. Integer - represented by ASCII

7. The number of subkeys generated in the IDEA algorithm is _______?

A. 54
B. 48
C. 52
D. 50

The number of 'S-boxes' used in the DES algorithm is _______?

A. 4
B. 8
C. 16
D. 32

9. ______ is an example of a public key algorithm.

A. RSA
B. DES
C. IREA
D. RC5

The Caesar cipher is represented by _______?

A. C = (p + 3) mod3
B. C = (p + 26) mod 3
C. C = (p - 3) mod 26
D. C = (p + 3) mod 26
IT Security Quiz - Part 3

The ______ attaches to executable files and replicates when the infected program is
executed, by searching for other executable files to infect.

A.A. Stealth Virus


B. Polymorphic virus
C. Virus parasite
D. Macro virus

2. The number of rounds in the DES (Data Encryption Standard) algorithm is ______?

A. 8 tours
B. 12 tours
C. 16 tours
D. 24 tours

3. ________ transforms the message into a format that cannot be read by hackers.

A. Decryption
B. Encryption
C. Transformation
D. None of these answers are true.

4. What is the port number for HTTPS (HTTP Secure)?

A. 43
B. 443
C. 445
D. 444

5. Which layer is responsible for the encryption and decryption of data?

A. Session layer
B. Network layer
Transport layer
D. Presentation layer

6. What is the key exchange algorithm used in the parameters of a cryptographic suite (Cipher
Suite)?

A. RSA
B. Fixed Diffie-Hellman
C. Ephemeral Diffie-Hellman
D. All the answers are true

The certificate message is required for any agreed key exchange method, except
A. Ephemeral Diffie-Hellman
B. Anonymous Diffie-Hellman
C. Fixed Diffie-Hellman
D. RSA

8. What are the types of threats to the security of a computer system or network?

A. Interruption
B. Interception
C. Modification
D. Creation
E. Fabrication

9. Firewalls are used to __________

A. Routing
Security
C. The tunneling
D. Congestion control

10. _________ is used to validate the identity of the message sender to the recipient.

A. Encryption
B. Decryption
C. Digital certificate
D. None of these answers is true.

IT Security Quiz – Part 4

1. When you log into an online service, you are prompted to provide some sort
of identification, such as your name, account number, and password. What is the name given
to this brief dialogue?

A. Security procedure
B. Connection Procedure
C. Backup procedure
D. Identification procedure

2. What hash algorithm does the DSS signature use?

A. MD5
B. SHA-2
C. SHA-1
D. Does not use a hashing algorithm

Malware is a form of virus explicitly designed to avoid detection by software.


antivirus.

A. Stealthy virus
B. Polymorphic virus
C. Virus parasite
D. Macro virus

4. A part of the polymorphic virus, generally called ________, creates random encryption.
and a key allowing to encrypt the rest of the virus.

A. Mutual motor
B. Mutation engine
C. Multiple engine
D. Polymorphic engine

5. Indicate whether the following statement is true:


A macro virus is platform-independent.

A. True
B. False

6. Indicate whether the following statement is true:


Macro viruses infect documents rather than executable code parts.

A. True
B. False

A _________ is a program that takes control of another computer connected to


Internet, then use this computer to launch attacks.

To see
B. Zombie
C. Virus
D. Trap doors

8. What hashing algorithm does RSA signing use?

A. MD5
B. SHA-1
C. MD5 and SHA-1
D. Trap doors

9. "certificate_request" includes two parameters, one of which is _____?

A
B. Certificate creation
C. Certificate_exchange
D.

10. What is the size of an RSA signature after the MD5 and SHA-1 processing?

A. 42 bytes
B. 32 bytes
C. 36 bytes
D. 48 octets

You might also like