Cyber Security Important Interview Questions with Answers - Set 01 - ObjectiveBooks

Cyber Security Important Interview Questions with Answers - Set 01

Practice Test: Question Set - 01


1. The CIA triad is often represented by which of the following?
    (A) Triangle
    (B) Diagonal
    (C) Ellipse
    (D) Circle

2. What is called the collective terms of malicious software, such as viruses, worms and trojans?
    (A) Spam
    (B) Phishing
    (C) Malware
    (D) Harm

3. In general how many key elements constitute the entire security structure?
    (A) 1
    (B) 2
    (C) 3
    (D) 4

4. What is called a single point of access for several networking services?
    (A) Phishing
    (B) Web service
    (C) Directory service
    (D) Worms

5. These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium
    (A) Malware
    (B) Remote Access Trojans
    (C) Keyloggers
    (D) Spyware

6. What is called the unauthorized control/access over the computer system and destroys the data?
    (A) Defamation
    (B) Carding
    (C) Hacking
    (D) Cyber - stalking

7. How many keys does the Triple DES algorithm use?
    (A) 2
    (B) 3
    (C) 2 or 3
    (D) 3 or 4

8. What is called protecting data from online attacks, deletions, malwares?
    (A) Physical security
    (B) Cyber security
    (C) Cyber attack
    (D) Virus

9. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.
    (A) 23
    (B) 46
    (C) 11
    (D) 54

10. AES uses a ____________ bit block size and a key size of __________ bits.
    (A) 128; 128 or 256
    (B) 64; 128 or 192
    (C) 256; 128, 192, or 256
    (D) 128; 128, 192, or 256

11. What is the full form of LDAP?
    (A) Light Weight Directory Access Provider
    (B) Light Weight Directory Access Protocol
    (C) Light Weight Directory Access Program
    (D) Light Weight Directory Access Protection

12. Which crime involves the use of computer networks to create, distribute or access materials that sexually exploit underage persons?
    (A) Assault by Threat
    (B) Cyber squatting
    (C) Cyber vandalism
    (D) Child pornography

13. Which of the following modes does not implement chaining or “dependency on previous stage computations”?
    (A) CTR, ECB
    (B) CTR, CFB
    (C) CFB, OFB
    (D) ECB, OFB

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests:

    Blogger Comment
    Facebook Comment