National Level Quiz Certificate on Cyber Security-Institutions’s Innovation Council
Hi everyone so here you will get free *” Online Quiz on CyberSecurity” by Organized by IIC( Institutions Innovation Council ) * This Quiz is designed to help you assess your knowledge. This is also a useful resource for employers to examine the knowledge of the candidates during an interview or for applicants who want to analyze their CyberSecurity knowledge. If you pass this test with 50% or above it is likely that you have pretty solid fundamental knowledge of CyberSecurity .
1.What is cyber security?
Provides security against malware
Provides security against cyber-terrorists
Protects a system from cyber attacks
All of the above
2.What is the aim of cyber security?
Cyber security aims to reduce cyberattacks
Cyber security aims to increase cyberattacks
Cyber security aims to cyberattack
None of the above
3.Who is the father of computer security?
August Kerckhoffs
Bob Thomas
Robert
Charles
4.When was first cyber security created?
1892
1972
1982
2000
5.Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
Cyberattack
Computer security
Cyber-security
Digital hacking
6.Which of the following is a type of cyber security?
Cloud Security
Network Security
Application Security
All of the above
7.Which of the following is not a cyber security threat?
Denial of Service
Man in the Middle
Malware
AES
8.Which of the following is a component of cyber security?
Internet Of Things
Database
Cyber-Attacks
AI
9.Which of the following is a type of cyber attack?
Phishing
SQL Injections
Password Attack
All of the above
10.An attempt to harm, damage or cause threat to a system or network is broadly termed as
Cyber-crime
Cyber Attack
System hijacking
Digital crime
11.Data _ is used to ensure confidentiality.
Encryption
Locking
Decryption
Backup
12.What is data encryption standard (DES)?
block cipher
stream cipher
bit cipher
byte cipher
13.A company requires its users to change passwords every month. This improves the __ of the network.
Performance
Reliability
Security
None of the above
14.This helps in identifying the origin of information and authentic user. This referred to here as __
Confidentiality
Integrity
Authenticity
Availability
15.Information security system must be protected. In case of an attack, it must:
Shutdown once the attack is confirmed
Provide enough information to assess the damage caused by the attack.
do nothing
None of the above
16.A hole or weakness in the system is called
Risk
Threat
Vulnerability
Impact
17.What does CARO stand for?
Computer Anti-virus Research Organization
Computer Algorithm Research Organization
Center for Advanced Research of Objects
Center for Algorithm Research
18.Netbus is an example of
Worm
Bacteria
Virus
Trojan
19.Nimda is an example of
Worm
Bacteria
Virus
Trojan
20.__ is not a type of cybercrime.
Damage to data and systems
Installing antivirus for protection
Data theft
Forgery