MCQsExam.com
Cybersecurity
Network security
Cryptography
Which attack exploits reused nonces in AES-GCM?
- A-Key-replay
- B-Nonce-reuse
- C-CRIME
- D-POODLE
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
Which port does DNS over TLS (DoT) use?
- A-53
- B-853
- C-443
- D-80
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
Which NIST category deals with “Identify”?
- A-Protect
- B-Detect
- C-Identify
- D-Recover
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
Which principle in computer security states that security should be designed in layers?
- A-Defense in Depth
- B-Principle of Least Privilege
- C-Separation of Duties
- D-Fail-Safe Defaults
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
Which principle in computer security states that users should have the minimum privileges necessary?
- A-Defense in Depth
- B-Principle of Least Privilege
- C-Separation of Duties
- D-Fail-Safe Defaults
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
Which principle in computer security states that security should not depend on the secrecy of the algorithm?
- A-Saltzer-Schroeder Principle
- B-Kerckhoffs's Principle
- C-Principle of Least Privilege
- D-Defense in Depth
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
In cryptography, what is the main vulnerability addressed by forward secrecy?
- A-Long-term key compromise
- B-Session key compromise
- C-Man-in-the-middle attacks
- D-Replay attacks
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
In cryptography, what is the main vulnerability that the Saltzer-Schroeder principle addresses?
- A-Man-in-the-middle attacks
- B-Complexity leading to security flaws
- C-Key distribution problems
- D-Side-channel attacks
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
Which cryptographic protocol enables two parties to establish a shared secret key over an insecure channel without prior shared secrets?
- A-RSA Encryption
- B-Diffie-Hellman key exchange
- C-Elliptic Curve Cryptography
- D-Quantum Key Distribution
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
What is a firewall's primary role?
- A-Encrypt data
- B-Monitor network traffic
- C-Block unauthorized access
- D-Detect intrusions
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
Which malware demands payment?
- A-Virus
- B-Ransomware
- C-Spyware
- D-Adware
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
What is the primary role of a firewall?
- A-Encrypt data
- B-Monitor network traffic
- C-Block unauthorized access
- D-Detect intrusions
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
Which type of malware demands payment for access to data?
- A-Virus
- B-Ransomware
- C-Spyware
- D-Adware
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
What does CIA stand for in cybersecurity?
- A-Central Intelligence Agency
- B-Confidentiality, Integrity, Availability
- C-Cyber Intelligence Assessment
- D-Critical Infrastructure Assurance
- MCQ By: MCQSEXAM
- Computer Science MCQs / Cybersecurity
- More about this MCQ
MCQs Exam
- Computer Science MCQs
- PHP
- Dot NET
- Algorithms and Data Structures
- Software Engineering
- Database Management Systems
- Computer Networks
- Operating Systems
- Artificial Intelligence (AI) and Machine Learning (ML)
- Computer Graphics
- Cybersecurity
- Mobile Computing
- HTML
- JAVA
- Cascading Style Sheets - CSS
- Javascript
- MySQL
- Jquery
- Bootstrap
- REACT
- C#
- Django
- General MCQs
- PHP
- Dot NET
- Algorithms and Data Structures
- Software Engineering
- Database Management Systems
- Computer Networks
- Operating Systems
- Artificial Intelligence (AI) and Machine Learning (ML)
- Computer Graphics
- Cybersecurity
- Mobile Computing
- HTML
- JAVA
- Cascading Style Sheets - CSS
- Javascript
- Arithmetic
- Basic Maths Mcqs
- Antonyms Mcqs
- Synonyms Mcqs
- Idioms And Phrases Mcqs
- MySQL
- Grammer and Vocabulary
- Jquery
- Bootstrap
- REACT
- C#
- Django