Google News
logo
Cyber Security - Quiz(MCQ)
A)
Private Connecting Technology
B)
Private Communication Technique
C)
Private Communication Technology
D)
Personal Communication Technology

Correct Answer : Option (C) :   Private Communication Technology


Explanation : Private Communication Technology (PCT) is similar to SSL except that the size of the message is smaller in the case of PCT. It supports different encryption algorithms like DES, RSA, Diffie-Hellman etc.

A)
1
B)
2
C)
3
D)
4

Correct Answer : Option (B) :   2


Explanation : For message encryption using PCT it requires two separate keys. Moreover, PCT has more options for data formats and security algorithms.

A)
Internet telephony
B)
Instant Messaging
C)
Voice over LTE (VoLTE)
D)
Data Transferring

Correct Answer : Option (D) :   Data Transferring


Explanation : Session Initiation Protocol is used as real-time session maintaining and is used voice, video as well as messaging applications for controlling multimedia communication sessions.

A)
Secure Real-time Transport Protocol
B)
Secure Relay Transport Protocol
C)
Secure Real-time Transferring Protocol
D)
Secure Real-time Transportation Protocol

Correct Answer : Option (A) :   Secure Real-time Transport Protocol


Explanation : Secure Real-time Transport Protocol is a real-time multimedia delivery protocol with encryption for message integrity and authentication. It is used mostly in entertainment systems and streaming media and sites.

A)
Cert Authority (CA)
B)
Cert Authorization (CA)
C)
Certificate Authorization (CA)
D)
Certificate Authority (CA)

Correct Answer : Option (D) :   Certificate Authority (CA)


Explanation : Digital Certificates are used for certifying the ownership of a public key and the entity who issue those certificates is the Certificate Authority.

A)
Attack
B)
Threat
C)
Target of Evaluation
D)
Vulnerability

Correct Answer : Option (C) :   Target of Evaluation


Explanation : Target of Evaluation is the term used when any IT infrastructure, system, network require evaluation for security reasons or for fixing any bugs after being tested by penetration testers.

A)
Threat
B)
Attack
C)
Exploit
D)
Vulnerability

Correct Answer : Option (B) :   Attack


Explanation : An “attack” or “cyber-attack” is an attempt taken by attackers to alter, delete, steal or expose any specific data by gaining unauthorized access.

A)
Data copying
B)
Data masking
C)
Data breaching
D)
Data duplicating

Correct Answer : Option (B) :   Data masking


Explanation : Data masking is the method used for developing or creating a structurally similar version of data of any organization that is not authentic. These types of unauthentic data are purposefully created for protecting the actual data.

A)
Trap doors
B)
Front doors
C)
Cover doors
D)
Back entry

Correct Answer : Option (A) :   Trap doors


Explanation : Trap-doors are hidden entry points in any already hacked system that is set to bypass security measures.

A)
Buffering
B)
Memory full
C)
Over buffering
D)
Buffer overflow

Correct Answer : Option (D) :   Buffer overflow


Explanation : Buffer Overflow is a flaw that occurs in memory when excessive data is written which makes the buffer allocated to seize.