How Well You Know About Cybersecurity? Trivia Quiz

10 Questions | Total Attempts: 193

SettingsSettingsSettings
Please wait...
How Well You Know About Cybersecurity? Trivia Quiz

How well do you know about cybersecurity? Computers are a perfect way of storing data and communicating, and the introduction of the internet has made all this much simpler. Do you know that there are so many loopholes in the computer that might allow other parties access to your data and privacy? This quiz will help you learn some more about securing your data.


Questions and Answers
  • 1. 
    _________________ partitions the physical hardware and presents this hardware to virtual machines.
    • A. 

      Physical hardware

    • B. 

      Hypervisor

    • C. 

      Virtual operating system

    • D. 

      Host operating system

  • 2. 
    "Access privileges granted to a user, program or process" is called as ________
    • A. 

      Authentication

    • B. 

      Authorization

    • C. 

      Confidentiality

    • D. 

      Integrity

  • 3. 
    The concept of using same key for encryption and decryption is called __________
    • A. 

      Asymmetric key system

    • B. 

      Substitution cipher

    • C. 

      Symmetric key system

    • D. 

      Caesar cipher

  • 4. 
    In symmetric key systems, ____________ key is used to generate ciphertext and plain text from the message.
    • A. 

      NOT 

    • B. 

      XOR

    • C. 

      AND

    • D. 

      NAND

  • 5. 
    Select the number of levels found in the Domain Name Server (DNS).
    • A. 

      128

    • B. 

      129

    • C. 

      127

    • D. 

      126

  • 6. 
    Each computer with internet access is assigned __________________
    • A. 

      Machine address

    • B. 

      Internet Protocol (IP)

    • C. 

      Internet availability

    • D. 

      Network Interface card

  • 7. 
    Records maintained in DNS are 
    • A. 

      A

    • B. 

      NX

    • C. 

      NS

    • D. 

      MX

    • E. 

      MS

  • 8. 
    ______________ are network devices or software that separates one trusted network from an untrusted network by means of rule-based filtering of network traffic.
    • A. 

      Windows firewall

    • B. 

      Phishing

    • C. 

      Firewalls

    • D. 

      Windows security

  • 9. 
    Parts of windows token are 
    • A. 

      Identity

    • B. 

      Access control

    • C. 

      Impersonate

    • D. 

      Privileges

    • E. 

      Type

    • F. 

      Thread access

    • G. 

      Process access

  • 10. 
    Thread specific rights have ___________ number of access rights.
    • A. 

      12

    • B. 

      14

    • C. 

      13

Back to Top Back to top