Mcq Assignm

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Quiz

HNDIT 3062 Course


Information and Computer Security
1. Which of the following is a fundamental concept of computer security?
A) Data Redundancy
B) Confidentiality, Integrity, and Availability
C) Hardware Failure
D) Software Licensing
2. Which of the following is NOT considered a threat to computer security?
A) Malware
B) Denial of Service (DoS)
C) Phishing
D) File Encryption
3. What is an asset in terms of computer security?
A) Any software that can be attacked
B) Any information or system resource that has value
C) Only hardware components of a system
D) A computer virus
04.Which of the following is an example of a security functional requirement?
A) System usability
B) Access control
C) Interface design
D) Processor speed

05.Which security functional requirement focuses on ensuring that actions of


an entity can be traced uniquely to that entity?
A) Confidentiality
B) Integrity
C) Non-repudiation
D) Availability
06.What is the primary goal of security architecture for open systems?
A) To limit interoperability between systems
B) To ensure consistent security across interconnected systems
C) To increase the system's complexity
D) To reduce network bandwidth

07. Which of the following is a current trend in computer security?


A) Decreasing use of encryption technologies
B) Increasing reliance on AI for threat detection
C) Reduction in the number of cyberattacks
D) Decreased use of multi-factor authentication.
08.Which of the following is a key principle in designing secure open
systems?
A) Limiting user access based on the principle of least privilege
B) Providing full access to all users
C) Using proprietary standards exclusively
D) Avoiding redundancy in security measures

09. Which of the following is considered an active attack?


A) Eavesdropping on network traffic
B) Installing a keylogger
C) Modifying the contents of a file
D) Collecting passwords using social engineering
10.Which of the following is true about symmetric key encryption?
A) Both sender and receiver use different keys for encryption and decryption.
B) Only the sender uses the key for encryption.
C) The same key is used for both encryption and decryption.
D) The sender does not need any key.

11. Which of the following symmetric encryption algorithms is considered


outdated due to weak security?
A) AES
B) DES
C) Blowfish
D) Twofish
12.In a symmetric encryption scheme, what is the most crucial aspect to
ensure confidentiality?
A) Key secrecy
B) Message length
C) Algorithm strength
D) Public key infrastructure

13. In public-key encryption, the public key is used for which of the
following?
A) Decrypting the message
B) Encrypting the message
C) Both encrypting and decrypting the message
D) None of the above
14.In public-key cryptography, the key pair consists of:
A) Two identical keys
B) A public key and a symmetric key
C) A public key and a private key
D) A hash value and a private key

15. What is the main purpose of a digital signature?


A) To encrypt a message for confidentiality
B) To provide authentication, integrity, and non-repudiation
C) To compress the message
D) To provide anonymous communication
16.Which of the following statements is true about digital signatures?
A) They are used to encrypt the entire message.
B) They are created by encrypting the hash of a message.
C) They can be verified without knowing the sender’s public key.
D) They provide encryption and decryption of the message.

17. What is the role of a Certificate Authority (CA) in a public-key


infrastructure (PKI)?
A) To issue private keys
B) To verify and issue digital certificates
C) To generate encryption keys
D) To provide message confidentiality
18.Which of the following protocols is considered a more secure version of
SSL?
A) HTTP
B) TLS
C) IPsec
D) FTP

19. Which of the following is part of the SSL/TLS handshake process?


A) Authentication of both server and client
B) Symmetric key distribution
C) Negotiation of encryption algorithms
D) All of the above
20.In digital signatures, the verification process typically involves:
a) Verifying the private key
b) Decrypting the message
c) Validating the public key
d) Comparing the hash of the message
21. What role does a Trusted Third Party (TTP) play in cryptographic
verification?
a) Encrypts the message for the sender
b) Verifies the identity of participants
c) Provides the private key to users
d) Stores encrypted data for long-term use
22.What is the primary difference between a digital signature and a
message authentication code (MAC)?
a) Digital signatures use public/private key pairs, while MACs use a
shared key
b) MACs are faster than digital signatures
c) Digital signatures can be used for encryption, while MACs cannot
d) MACs provide non-repudiation, while digital signatures do not
23.When verifying a digital signature, what is compared to ensure
authenticity?
a) The decrypted message and the original message
b) The hash of the message and the hash of the digital signature
c) The public key and private key
d) The encrypted message and the decrypted message
24.What type of authentication method involves using physical
characteristics like fingerprints or retina scans?
a) Password authentication
b) Biometric authentication
c) Token-based authentication
d) Challenge-response authentication
25.Which of the following is NOT a common method of user
authentication?
a) Password-based authentication
b) Biometric authentication
c) Token-based authentication
d) Data compression
26.Which of the following is a weakness of password-based
authentication?
a) High complexity
b) Vulnerability to brute force attacks
c) Inability to scale for multiple users
d) Requires physical tokens for access
27.Which type of authentication provides the highest level of security?
a) Password-based authentication
b) Biometric authentication
c) Multi-factor authentication (MFA)
d) Single sign-on (SSO)
28.Which of the following access control models enforces access
policies based on attributes like location, time, and device?
a) Role-based access control (RBAC)
b) Discretionary access control (DAC)
c) Attribute-based access control (ABAC)
d) Mandatory access control (MAC)
29.What is the main characteristic of role-based access control
(RBAC)?
a) Access is determined by the user's role in the organization
b) Access is granted based on user attributes
c) Users are granted access based on specific requests
d) Access is granted automatically based on the type of data being
accessed
30.Which access control model allows access to be
dynamically adjusted based on environmental factors like the
time of day or network location?
a) Role-based access control (RBAC)
b) Attribute-based access control (ABAC)
c) Mandatory access control (MAC)
d) Discretionary access control (DAC)
1) B 11) B 21) B
2) D 12) A 22) A
3) B 13) B 23) B
4) B 14) C 24) B
5) C 15) B 25) D
6) B 16) B 26) B
7) B 17) B 27) C
8) A 18) B 28) C
9) C 19) D 29) A
10)C 20) D 30) B

You might also like