Computer Security Quiz with answers – Part 2

Computer Security/IT security/Cybersecurity Quiz with answers – Part 2

Test your knowledge in Computer Security with interactive Quiz in networks, internet, IT security, attacks and intrusions Quiz, defenses, technical measures, and cryptography.

______ is a program that can infect other programs by modifying them. This change includes a copy of the viral program, which can then infect other programs.
Warm
Virus
Zombie
Backdoor

Correct!

Wrong!

______ are used in denial of service attacks, usually against targeted websites.
Warm
Virus
Zombie
Trojan

Correct!

Wrong!

The type of coding in which bit stream manipulation without regard to the meaning of the bits is called _________?
Destination coding
Entropy coding
Source coding
Differential coding

Correct!

Wrong!

The protocol used to secure e-mails?
POP
PGP
SNMP
HTTP

Correct!

Wrong!

The art of breaking numbers is known as ____?
Cryptology
Cryptography
Cryptanalysis
Encryption

Correct!

Wrong!

Which of the following statements is correct ?
Character - represented by a complement
Character - represented by the complement of two
Character - represented by Unicode
Integer - represented by ASCII

Correct!

Wrong!

The number of subkeys generated in the IDEA algorithm is _______?
54
48
52
50

Correct!

Wrong!

The number of "S-boxes" used in the DES algorithm is _______?
4
8
16
32

Correct!

Wrong!

______ is an example of a public key algorithm.
RSA
DES
IREA
RC5

Correct!

Wrong!

The number of Caesar is represented by _______?
C = (p + 3) mod3
C = (p + 26) mod3
C = (p - 3) mod26
C = (p + 3) mod26

Correct!

Wrong!

Share the quiz to show your results !

Subscribe to see your results

Computer security Quiz – Part 2

I got %%score%% of %%total%% right

%%description%%

%%description%%

Loading...

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *