Cyber Security MCQ SET- 18
This section contains more frequently asked System Security and Computer Crime Multiple Choice Questions Answers in the various competitive exams.
1. What is the difference between a worm and virus?
- A worm does not replicate itself like a virus does, but rather moves from computer to computer
- A virus infects files, while a worm eats them
- A worm is a virus created for a very specific purpose
- Unlike a virus, a worm does not need to attach itself to a program to spread.
2. Which of the following represents a cryptographic key that is intended to be used for a long period of time?
- Private key transport key
- Public authentication key
- Public signature verification key
- Private static key agreement key
3. Which of the following is a VALID ephemeral key?
- Asymmetric ephemeral random number generation keys
- Public ephemeral verification key
- Symmetric ephemeral random number generation keys
- Public ephemeral key agreement key
4. Which of the following enables secure and private data exchange/transfer on an unsecure public network ?
- Public Key Infrastructure
- Virtual Key Infrastructure
- Private Key Infrastructure
- All of the given options are correct
5. Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
- Symmetric random number generation keys
- Asymmetric random number generation keys
- Symmetric key wrapping key
- Public signature verification key
6. Which of the following keys are used to encrypt other keys using symmetric key algorithms ?
- Symmetric random number generation keys
- Asymmetric random number generation keys
- Symmetric key wrapping key
- Public signature verification key
7. Which of the following is a standalone computer program that pretends to be a well-known program in order to steal confidential data ?
- Virus
- Spyware
- Fraudtool
- Malware
8. In the sublayer of which of the following does TLS and SSL performs the data encryption of network connections?
- presentation layer
- Both session and presentation layer
- session layer
- application layer
9. Which of the following are the public keys of asymmetric (public) key pairs that are used to encrypt keys using a public key algorithm?
- Public signature verification key
- Private signature key
- Public key transport key
- Private key transport key
10. Which of the following are the public keys of asymmetric key pairs that are used to encrypt keys using a public key algorithm ?
- Private signature key
- Private key transport key
- Public signature verification key
- Public authentication key