MCQsExam.com

Cybersecurity

Network security

Cryptography

Which attack exploits reused nonces in AES-GCM?
  1. A-Key-replay
  2. B-Nonce-reuse
  3. C-CRIME
  4. D-POODLE
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
Which port does DNS over TLS (DoT) use?
  1. A-53
  2. B-853
  3. C-443
  4. D-80
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
Which NIST category deals with “Identify”?
  1. A-Protect
  2. B-Detect
  3. C-Identify
  4. D-Recover
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
Which principle in computer security states that security should be designed in layers?
  1. A-Defense in Depth
  2. B-Principle of Least Privilege
  3. C-Separation of Duties
  4. D-Fail-Safe Defaults
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
Which principle in computer security states that users should have the minimum privileges necessary?
  1. A-Defense in Depth
  2. B-Principle of Least Privilege
  3. C-Separation of Duties
  4. D-Fail-Safe Defaults
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
Which principle in computer security states that security should not depend on the secrecy of the algorithm?
  1. A-Saltzer-Schroeder Principle
  2. B-Kerckhoffs's Principle
  3. C-Principle of Least Privilege
  4. D-Defense in Depth
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
In cryptography, what is the main vulnerability addressed by forward secrecy?
  1. A-Long-term key compromise
  2. B-Session key compromise
  3. C-Man-in-the-middle attacks
  4. D-Replay attacks
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
In cryptography, what is the main vulnerability that the Saltzer-Schroeder principle addresses?
  1. A-Man-in-the-middle attacks
  2. B-Complexity leading to security flaws
  3. C-Key distribution problems
  4. D-Side-channel attacks
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
Which cryptographic protocol enables two parties to establish a shared secret key over an insecure channel without prior shared secrets?
  1. A-RSA Encryption
  2. B-Diffie-Hellman key exchange
  3. C-Elliptic Curve Cryptography
  4. D-Quantum Key Distribution
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
What is a firewall's primary role?
  1. A-Encrypt data
  2. B-Monitor network traffic
  3. C-Block unauthorized access
  4. D-Detect intrusions
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
Which malware demands payment?
  1. A-Virus
  2. B-Ransomware
  3. C-Spyware
  4. D-Adware
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
What is the primary role of a firewall?
  1. A-Encrypt data
  2. B-Monitor network traffic
  3. C-Block unauthorized access
  4. D-Detect intrusions
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
Which type of malware demands payment for access to data?
  1. A-Virus
  2. B-Ransomware
  3. C-Spyware
  4. D-Adware
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ
What does CIA stand for in cybersecurity?
  1. A-Central Intelligence Agency
  2. B-Confidentiality, Integrity, Availability
  3. C-Cyber Intelligence Assessment
  4. D-Critical Infrastructure Assurance
  5. MCQ By: MCQSEXAM
  6. Computer Science MCQs / Cybersecurity
  7. More about this MCQ