Computer Security Quiz with answers – Part 3

Computer Security/IT security/Cybersecurity Quiz with answers – Part 3
Test your knowledge in Computer Security with interactive Quiz in networks, internet, IT security, attacks and intrusions Quiz, defenses, technical measures, and cryptography.
The ______ attaches to executable files and replicates, when the infected program is running, it looks for other executable files to infect.
Stealth virus
Polymorphic virus
Parasitic virus
Macro virus
Correct!
Wrong!
Number of turns in the DES (Data Encryption Standard) algorithm is ______?
8 turns
12 turns
16 turns
24 turns
Correct!
Wrong!
________ transforms the message into a format that cannot be read by hackers.
Decryption
Encryption
Transformation
None of these answers is true.
Correct!
Wrong!
What is the port number for HTTPS (HTTP Secure)?
43
443
445
444
Correct!
Wrong!
Which layer is responsible for encryption and decryption of data?
Session layer
Network layer
Transport layer
Presentation layer
Correct!
Wrong!
What is the key exchange algorithm used in the setting of a Cipher Suite?
RSA
Fixed Diffie-Hellman
Ephemeral Diffie-Hellman
All the answers are true
Correct!
Wrong!
The certificate message is required for any agreed key exchange method, except __________.
Ephemeral Diffie-Hellman
Anonymous Diffie-Hellman
Fixed Diffie-Hellman
RSA
Correct!
Wrong!
The types of threats to the security of a computer system or network are _______?
Interruption
Interception
change
Creation
Manufacturing
Correct!
Wrong!
Firewalls are used fo ___
Routing
Security
Tunneling
Congestion control
Correct!
Wrong!
_________ is used to validate the identity of the sender of the message to the recipient.
Encryption
Decryption
Digital certificate
None of these answers is true.
Correct!
Wrong!
Share the quiz to show your results !
Subscribe to see your results
Computer security Quiz – Part 3
I got %%score%% of %%total%% right
%%description%%
%%description%%
Loading...