National Level Quiz Certificate on Cyber Security – Institutions’s Innovation Council
Hi everyone so here you will get free ”Online Quiz on Cyber Security” by Organized by IIC (Institutions Innovation Council). This Quiz is designed to help you assess your knowledge. This is also a useful resource for employers to examine the knowledge of the candidates during an interview or for applicants who want to analyze their Cyber Security knowledge. If you pass this test with 50% or above it is likely that you have pretty solid fundamental knowledge of Cyber Security.
Q1) What is cyber security?
- Provides security against malware
- Provides security against cyber-terrorists
- Protects a system from cyber attacks
- All of the above
Q2) What is the aim of cyber security?
- Cyber security aims to reduce cyberattacks
- Cyber security aims to increase cyberattacks
- Cyber security aims to cyberattack
- None of the above
Q3) Who is the father of computer security?
- August Kerckhoffs
- Bob Thomas
- Robert
- Charles
Q4) When was first cyber security created?
- 1892
- 1972
- 1982
- 2000
Q5) Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
- Cyberattack
- Computer security
- Cyber-security
- Digital hacking
Q6) Which of the following is a type of cyber security?
- Cloud Security
- Network Security
- Application Security
- All of the above
Q7) Which of the following is not a cyber security threat?
- Denial of Service
- Man in the Middle
- Malware
- AES
Q8) Which of the following is a component of cyber security?
- Internet Of Things
- Database
- Cyber-Attacks
- AI
Q9) Which of the following is a type of cyber attack?
- Phishing
- SQL Injections
- Password Attack
- All of the above
Q10) An attempt to harm, damage or cause threat to a system or network is broadly termed as
- Cyber-Crime
- Cyber Attack
- System Hijacking
- Digital Crime
Q11) Data _ is used to ensure confidentiality.
- Encryption
- Locking
- Decryption
- Backup
Q12) What is data encryption standard (DES)?
- block cipher
- stream cipher
- bit cipher
- byte cipher
Q13) A company requires its users to change passwords every month. This improves the __ of the network.
- Performance
- Reliability
- Security
- None of the above
Q14) This helps in identifying the origin of information and authentic user. This referred to here as __
- Confidentiality
- Integrity
- Authenticity
- Availability
Q15) Information security system must be protected. In case of an attack, it must:
- Shutdown once the attack is confirmed.
- Provide enough information to assess the damage caused by the attack.
- Do nothing.
- None of the above.
Q16) A hole or weakness in the system is called
- Risk
- Threat
- Vulnerability
- Impact
Q17) What does CARO stand for?
- Computer Anti-virus Research Organization
- Computer Algorithm Research Organization
- Center for Advanced Research of Objects
- Center for Algorithm Research
Q18) Netbus is an example of
- Worm
- Bacteria
- Virus
- Trojan
Q19) Nimda is an example of
- Worm
- Bacteria
- Virus
- Trojan
Q20) __ is not a type of cybercrime.
- Damage to data and systems
- Installing antivirus for protection
- Data theft
- Forgery