Grade – 11 – Computer Science – Cybersecurity and Network Defense – Multiple Choice Questions

Multiple Choice Questions

Cybersecurity and Network Defense

Topic: Cybersecurity and Network Defense
Grade: 11

Question 1:
Which of the following is an example of a social engineering attack?
a) Distributed Denial of Service (DDoS) attack
b) Phishing attack
c) SQL injection attack
d) Man-in-the-middle attack

Answer: b) Phishing attack

Explanation: Phishing is a type of social engineering attack where an attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information. The attacker often sends emails or messages that appear to be from legitimate sources, such as banks or online services, asking for login credentials or personal information. This information can then be used to gain unauthorized access to accounts or commit identity theft. A simple example of a phishing attack is an email claiming to be from a bank, asking the recipient to click on a link and enter their account details. A more complex example would be a targeted phishing attack where the attacker gathers specific information about the victim to make the email appear more convincing.

Question 2:
Which of the following encryption algorithms is considered to be the most secure?
a) DES
b) AES
c) RSA
d) Blowfish

Answer: b) AES

Explanation: AES (Advanced Encryption Standard) is currently the most widely used encryption algorithm and is considered to be highly secure. It uses symmetric key encryption, where the same key is used for both encryption and decryption. AES has a variable key length, with 128-bit, 192-bit, and 256-bit options. It has been extensively studied and tested, and no practical vulnerabilities have been found. A simple example of AES encryption would be encrypting a message using a secret key, and the complex example would involve implementing AES encryption in a secure messaging application to protect sensitive communications.

Question 3:
Which of the following is an example of a physical security control?
a) Firewall
b) Intrusion Detection System (IDS)
c) Biometric access control
d) Encryption

Answer: c) Biometric access control

Explanation: Physical security controls are measures that are put in place to protect physical assets, such as buildings, equipment, or data centers. Biometric access control is a physical security control that uses unique physical characteristics, such as fingerprints or facial recognition, to authenticate individuals and control access to a secure area. This helps prevent unauthorized individuals from gaining physical access to sensitive areas. A simple example of biometric access control is using a fingerprint scanner to unlock a door, while a complex example would involve implementing a multi-factor biometric access control system with additional security measures, such as motion sensors and CCTV cameras.

Question 4:
Which of the following is an example of a network-based intrusion detection system?
a) Antivirus software
b) Firewall
c) Honeypot
d) Snort

Answer: d) Snort

Explanation: Snort is an example of a network-based intrusion detection system (NIDS). NIDS are designed to monitor network traffic and detect suspicious or malicious activity. Snort is an open-source NIDS that uses signature-based detection to identify known attack patterns. It can analyze network packets in real-time and generate alerts when it detects potential attacks. A simple example of Snort would be setting up the tool to monitor network traffic on a small home network, while a complex example would involve deploying Snort in a large enterprise environment with multiple network segments and custom rule sets.

Question 5:
Which of the following is NOT a common authentication factor?
a) Something you know
b) Something you have
c) Something you are
d) Something you want

Answer: d) Something you want

Explanation: The three common authentication factors are something you know (such as a password or PIN), something you have (such as a smart card or security token), and something you are (such as biometric characteristics). \”Something you want\” is not a recognized authentication factor. A simple example of something you know would be entering a password to log into a computer, while a complex example of something you have would be using a smart card and a PIN to access a secure facility.

Question 6:
Which of the following is an example of a symmetric encryption algorithm?
a) RSA
b) Diffie-Hellman
c) AES
d) ECC

Answer: c) AES

Explanation: AES (Advanced Encryption Standard) is an example of a symmetric encryption algorithm. Symmetric encryption uses the same key for both encryption and decryption. AES is a block cipher that operates on fixed-size blocks of data and has a variable key length. It is widely used for securing sensitive data and communications. A simple example of AES encryption would be encrypting a file using a shared secret key, while a complex example would involve implementing AES encryption in a secure messaging application to protect real-time communication.

Question 7:
Which of the following is a security principle that aims to ensure that only authorized parties can access data?
a) Confidentiality
b) Integrity
c) Availability
d) Non-repudiation

Answer: a) Confidentiality

Explanation: Confidentiality is a security principle that ensures that only authorized parties can access sensitive data. It involves protecting data from unauthorized disclosure or access. This can be achieved through encryption, access controls, and secure storage practices. A simple example of confidentiality would be encrypting a file with a password, while a complex example would be implementing end-to-end encryption in a messaging application to protect user communications.

Question 8:
Which of the following is a commonly used cryptographic hash function?
a) MD5
b) SHA-1
c) RSA
d) Diffie-Hellman

Answer: b) SHA-1

Explanation: SHA-1 (Secure Hash Algorithm 1) is a commonly used cryptographic hash function. Hash functions are mathematical algorithms that take an input (message) and produce a fixed-size output (hash value). They are used in various security applications, such as password hashing and digital signatures. SHA-1, although widely used in the past, is now considered to be insecure due to vulnerabilities that have been discovered. A simple example of using SHA-1 would be calculating the hash value of a file, while a complex example would involve implementing a secure password storage system using a stronger hash function, such as SHA-256.

Question 9:
Which of the following is a common vulnerability associated with web applications?
a) Cross-site scripting (XSS)
b) Distributed Denial of Service (DDoS)
c) Man-in-the-middle (MitM) attack
d) SQL injection

Answer: d) SQL injection

Explanation: SQL injection is a common vulnerability associated with web applications. It occurs when an attacker is able to manipulate the input to an application\’s database query, allowing them to execute unauthorized SQL commands. This can result in data breaches, unauthorized access, or even complete compromise of the application and underlying systems. A simple example of SQL injection would be entering malicious SQL code into a login form to bypass authentication, while a complex example would involve exploiting SQL injection vulnerabilities in a complex web application to gain unauthorized access to a database.

Question 10:
Which of the following is an example of a network protocol that provides secure communication over the internet?
a) HTTP
b) FTP
c) SSL/TLS
d) DNS

Answer: c) SSL/TLS

Explanation: SSL (Secure Sockets Layer) and its successor TLS (Transport Layer Security) are network protocols that provide secure communication over the internet. They use encryption and authentication mechanisms to ensure the confidentiality and integrity of data transmitted between a client and a server. SSL/TLS is commonly used for secure web browsing (HTTPS) and secure email (SMTPS). A simple example of SSL/TLS would be accessing a website that uses HTTPS, while a complex example would involve configuring SSL/TLS on a web server and implementing certificate management to ensure secure communication.

Question 11:
Which of the following is an example of a security control that helps prevent unauthorized access to a network?
a) Firewall
b) Antivirus software
c) Intrusion Detection System (IDS)
d) Encryption

Answer: a) Firewall

Explanation: A firewall is a security control that helps prevent unauthorized access to a network. It acts as a barrier between an internal network and external networks, allowing or blocking network traffic based on a set of predefined rules. Firewalls can be implemented as hardware devices or software applications. They help protect against various types of network attacks, such as unauthorized access, malware, and denial of service. A simple example of a firewall would be configuring a home router to block incoming connections, while a complex example would involve deploying a network firewall with advanced features, such as intrusion prevention and deep packet inspection.

Question 12:
Which of the following is an example of a threat actor?
a) Firewall
b) Malware
c) Encryption
d) Antivirus software

Answer: b) Malware

Explanation: A threat actor refers to any individual or group that poses a threat to the security of computer systems or networks. Malware, such as viruses, worms, or ransomware, is an example of a threat actor. Malware is designed to exploit vulnerabilities in systems or deceive users to gain unauthorized access, steal sensitive information, or disrupt normal operations. A simple example of malware would be a computer virus that spreads through email attachments, while a complex example would involve analyzing a sophisticated malware sample to understand its behavior and develop countermeasures.

Question 13:
Which of the following is an example of a secure password practice?
a) Using the same password for multiple accounts
b) Using a long password with only lowercase letters
c) Changing passwords every week
d) Storing passwords in a text file

Answer: b) Using a long password with only lowercase letters

Explanation: Using a long password with a combination of uppercase and lowercase letters, numbers, and special characters is considered a secure password practice. This makes the password harder to guess or crack through brute-force attacks. Using the same password for multiple accounts is a poor practice as it increases the risk of unauthorized access if one account is compromised. Changing passwords regularly is also recommended, but the frequency should be based on the sensitivity of the account and the organization\’s policies. Storing passwords in a text file is insecure as it can be easily accessed if the file is compromised.

Question 14:
Which of the following laws is aimed at protecting individuals\’ personal information and privacy?
a) Computer Fraud and Abuse Act (CFAA)
b) Health Insurance Portability and Accountability Act (HIPAA)
c) Sarbanes-Oxley Act (SOX)
d) General Data Protection Regulation (GDPR)

Answer: d) General Data Protection Regulation (GDPR)

Explanation: The General Data Protection Regulation (GDPR) is a law that was enacted by the European Union (EU) to protect individuals\’ personal information and privacy. It applies to organizations that process personal data of EU residents, regardless of where the organization is located. The GDPR sets out various requirements for organizations, such as obtaining consent for data processing, implementing appropriate security measures, and providing individuals with rights over their data. A simple example of GDPR compliance would be obtaining explicit consent from individuals before collecting their personal information, while a complex example would involve implementing data protection policies and procedures in a multinational organization to ensure compliance with GDPR requirements.

Question 15:
Which of the following is an example of a secure software development practice?
a) Ignoring security vulnerabilities in the code
b) Regularly patching software with security updates
c) Storing sensitive data in plain text
d) Using weak encryption algorithms

Answer: b) Regularly patching software with security updates

Explanation: Regularly patching software with security updates is a secure software development practice. Software vulnerabilities can be discovered over time, and patching them with updates helps to address these vulnerabilities and protect against potential attacks. Ignoring security vulnerabilities in the code is a poor practice as it leaves the software vulnerable to exploitation. Storing sensitive data in plain text is insecure as it can be easily accessed if the data is compromised. Using weak encryption algorithms also increases the risk of unauthorized access to sensitive information.

Leave a Comment

Your email address will not be published. Required fields are marked *

Shopping Cart
error: Content cannot be copied. it is protected !!
Scroll to Top