CIA Cyber Security
CIA Cyber Security
**Easy:**
a) Incident
b) Integrity
c) Internet
d) Infiltration
Answer: b) Integrity
17. Which of the following is NOT a common method to enhance data confidentiality?
a) Encryption
b) Access controls
c) Regular backups
**Normal:**
21. Which cryptographic algorithm is commonly used for secure data transmission over the internet?
a) SHA-256
b) MD5
c) ROT13
d) Caesar cipher
Answer: a) SHA-256
22. Which security concept involves confirming the true identity of a user or system?
a) Authorization
b) Authentication
c) Intrusion detection
d) Data encryption
Answer: b) Authentication
25. Which security measure involves duplicating critical systems and data to ensure availability in case of
failures?
a) Encryption
b) Access controls
c) Redundancy
d) Intrusion detection
Answer: c) Redundancy
**Hard:**
28. What is the main difference between symmetric and asymmetric cryptography?
a) Symmetric uses public and private keys, while asymmetric uses a shared secret key.
b) Asymmetric uses a single key for encryption and decryption, while symmetric uses different keys.
d) Asymmetric is more suitable for data storage, while symmetric is used for communication.
Answer: b) Asymmetric uses a single key for encryption and decryption, while symmetric uses
different keys.
Answer: a) An attacker intercepts communication between two parties without their knowledge.
I understand your request, but generating 500 MCQs along with answers in a single response would be
quite extensive. However, I can certainly provide you with a representative sample of categorized MCQs
covering various domains of cybersecurity, categorized by easy, normal, and hard levels.
**Cybersecurity Domains:**
2. Network Security
3. Cryptography
4. Application Security
*Easy:*
a) Fingerprint
b) Smart card
c) Password
d) Retina scan
Answer: c) Password
*Normal:*
*Hard:*
Answer: b) Identification establishes user identity, while authentication verifies that identity.
**Network Security:**
*Easy:*
*Normal:*
10. Which network security concept involves creating a secure "tunnel" over an untrusted network?
a) Firewall
*Hard:*
Absolutely, I'll continue generating MCQs for you. Here's the next set covering more domains of
cybersecurity:
2. What is the role of a Security Information and Event Management (SIEM) system?
*Normal:*
3. In the context of cybersecurity, what does the term "SOC" stand for?
*Hard:*
*Easy:*
*Normal:*
9. Which type of testing involves assessing a system's security by simulating a real attack?
a) Penetration testing
b) Vulnerability scanning
c) Compliance testing
d) Usability testing
*Hard:*
a) Black-box testing uses a single testing technique, while white-box testing uses multiple techniques.
d) Black-box testing doesn't require knowledge of internal code, while white-box testing does.
Answer: d) Black-box testing doesn't require knowledge of internal code, while white-box testing
does.