Computer Security Quiz with answers – Part 2
Computer Security/IT security/Cybersecurity Quiz with answers – Part 2
Test your knowledge in Computer Security with interactive Quiz in networks, internet, IT security, attacks and intrusions Quiz, defenses, technical measures, and cryptography.
______ is a program that can infect other programs by modifying them. This change includes a copy of the viral program, which can then infect other programs.
Warm
Virus
Zombie
Backdoor
Correct!
Wrong!
______ are used in denial of service attacks, usually against targeted websites.
Warm
Virus
Zombie
Trojan
Correct!
Wrong!
The type of coding in which bit stream manipulation without regard to the meaning of the bits is called _________?
Destination coding
Entropy coding
Source coding
Differential coding
Correct!
Wrong!
The protocol used to secure e-mails?
POP
PGP
SNMP
HTTP
Correct!
Wrong!
The art of breaking numbers is known as ____?
Cryptology
Cryptography
Cryptanalysis
Encryption
Correct!
Wrong!
Which of the following statements is correct ?
Character - represented by a complement
Character - represented by the complement of two
Character - represented by Unicode
Integer - represented by ASCII
Correct!
Wrong!
The number of subkeys generated in the IDEA algorithm is _______?
54
48
52
50
Correct!
Wrong!
The number of "S-boxes" used in the DES algorithm is _______?
4
8
16
32
Correct!
Wrong!
______ is an example of a public key algorithm.
RSA
DES
IREA
RC5
Correct!
Wrong!
The number of Caesar is represented by _______?
C = (p + 3) mod3
C = (p + 26) mod3
C = (p - 3) mod26
C = (p + 3) mod26
Correct!
Wrong!
Share the quiz to show your results !
Subscribe to see your results
Computer security Quiz – Part 2
I got %%score%% of %%total%% right
%%description%%
%%description%%
Loading...