Test Series - cyber security

Test Number 1/13

Q: What is cyber security?
A. Provides security against malware
B. Provides security against cyber-terrorists
C. Protects a system from cyber attacks
D. All of the above
Solution: Cyber security provides security to a system against cyber-attacks by using various technologies, and processes.
Q: What does cyber security protect?
A. Criminals
B. Internet-connected systems
C. Hackers
D. None of the above
Solution: It protects internet-connected systems such as hardware, software, and data from cyber-attacks. It aims to reduce cyberattacks against the system, network, and technologies by reducing unauthorized exploitation, vulnerability, and threats.
Q: Who is the father of computer security?
A. August Kerckhoffs
B. Bob Thomas
C. Robert
D. Charles
Solution: August Kerckhoffs, a linguist and German professor at HEC, wrote an essay in the Journal of Military Science in February 1883. Kerckhoff had unwittingly established the foundations for contemporary encryption, earning him the title of “Father of Computer Security.”
Q: Which of the following is an objective of network security?
A. Confidentiality
B. Integrity
C. Availability
D. All of the above
Solution: The objectives of network security are Confidentiality, Integrity, and Availability.
Confidentiality: The function of confidentiality is to keep sensitive company information safe from unwanted access. The confidentiality component of network security ensures that data is only accessible to those who are authorized to see it.
Integrity: This goal entails ensuring and preserving data accuracy and consistency. The purpose of integrity is to ensure that data is accurate and not tampered with by unauthorized individuals.
Availability: The purpose of availability in Network Security is to ensure that data, network resources, and services are always available to legitimate users, whenever they need them.
Q: Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
A. Cyberattack
B. Computer security
C. Cryptography
D. Digital hacking
Solution: An effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems, related peripherals, network systems, and information, is known as a cyber attack.
Q: Which of the following is a type of cyber security?
A. Cloud Security
B. Network Security
C. Application Security
D. All of the above
Solution: Since technology is improving, the threats and attacks against the technology are also increasing. Hence, to provide security, it is divided into the following types:
Cloud Security: Provides security for the data stored on the cloud.
Network Security: Protects the internal network from threats.
Application Security: Protects data stored in the application software.
Q: What are the features of cyber security?
A. Compliance
B. Defense against internal threats
C. Threat Prevention
D. All of the above
Solution: The features are as follows:
Compliance: Creating a program that meets the requirements and rules of the users.
Defense against internal threats: Should provide security against internal exploitation.
Threat Prevention: Should be capable of detecting the threat and preventing them.
Q: Which of the following is not a cybercrime?
threat?
A. Denial of Service
B. Man in the Middle
C. Malware
D. AES
Solution: Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.
Q: Which of the following is a component of cyber security?
A. Internet Of Things
B. AI
C. Database
D. Attacks
Solution: The Internet of Things (IoT) is a network of physical objects embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems through the internet.
Q: Which of the following is a type of cyber attack?
A. Phishing
B. SQL Injections
C. Password Attack
D. All of the above
Solution: Attacks are Phishing, SQL Injections, and Password Attacks.
Phishing: The attacker sends a large number of fraudulent emails and gains access to the system.
SQL Injections: The attacker gains access to the protected information by adding malicious code to the SQL server.
Password Attacks: Attackers gain access to the passwords unethically and gain access to the confidential data.

You Have Score    /10