Security Protocols
Cyber-Attacks
Security Methods
Cipher Methods
Computing Applications
100

Which protocol is used to securely browse websites?
A. HTTP
B. FTP
C. HTTPS
D. SMTP

C. HTTPS

100

A cyber-attack that floods a server with traffic is called:
A. DDoS
B. Phishing
C. SQL Injection
D. Spoofing

Answer: A. DDoS

100

Method of verifying identity using password or biometrics.

Answer: Authentication

100

Which cipher shifts letters by a fixed number?
A. Vigenère
B. Caesar Cipher
C. RSA
D. DES

Answer: B. Caesar Cipher

100

Which application is used for word processing?
A. Excel
B. PowerPoint
C. Word
D. Access

Answer: C. Word

200

_____ is the protocol used for secure remote login over a network.
Answer: SSH

Answer: SSH

200

Attack where an email tricks you into giving personal data.

Answer: Phishing

200

Which is NOT a type of authentication factor?
A. Something you know
B. Something you have
C. Something you are
D. Something you imagine

Answer: D. Something you imagine

200

RSA is an example of _______ key cryptography.

Answer: Public-key / Asymmetric

200

Software used for browsing the internet.

Answer: Browser

300

Which protocol secures email communication?

Answer: TLS / SSL

300

A malware that encrypts files and demands money is known as _______.

Answer: Ransomware

300

The process of converting data into unreadable form for protection is called _______.

Answer: Encryption

300

The Vigenère cipher uses a _______ to encrypt messages.

Answer: Key / Keyword

300

A program that manages computer hardware is called an _______.

Answer: Operating System

400

Which protocol is used to establish secure VPN tunnels?
A. IPsec
B. POP3
C. SNMP
D. RDP

Answer: A. IPsec

400

Which attack involves injecting malicious commands into a database query?
A. MITM
B. SQL Injection
C. Sniffing
D. Backdoor

Answer: B. SQL Injection

400

Which security method ensures data has not been altered?
A. Integrity
B. Availability
C. Authentication
D. Tracking

Answer: A. Integrity

400

Which of the following is a symmetric encryption algorithm?
A. RSA
B. ECC
C. AES
D. Diffie-Hellman

Answer: C. AES

400

Which of these is an example of cloud storage?
A. BIOS
B. Dropbox
C. SSH
D. SQL

Answer: B. Dropbox

500

Name the protocol that encrypts Wi-Fi traffic in modern networks.

Answer: WPA3

500

Name the attack where an attacker secretly alters communication between two parties.

Answer: Man-in-the-Middle (MITM)

500

What is the method of dividing a network into multiple segments for security?

Answer: Network Segmentation

500

Name the cipher method that encrypts one bit or byte at a time.

Answer: Stream Cipher

500

What do we call software that allows users to run virtual machines?

Answer: Hypervisor / Virtualization Software

M
e
n
u