6. Networks & Security

Cybersecurity — Quiz

Test your understanding of cybersecurity with 5 practice questions.

Read the lesson first

Practice Questions

Question 1

In a public-key infrastructure (PKI), what is the primary role of a Certificate Authority (CA) in establishing trust?

Question 2

Consider a cryptographic hash function $H(M)$ that produces a fixed-size output. Which of the following properties is essential for $H(M)$ to be considered cryptographically secure for integrity checks?

Question 3

A secure coding practice known as 'Principle of Least Privilege' (PoLP) is crucial for minimizing the impact of security breaches. Which of the following scenarios best exemplifies the application of PoLP?

Question 4

In threat modeling, the STRIDE methodology categorizes threats into six types. Which of the following threat types is primarily concerned with ensuring that data or systems are not tampered with or altered in an unauthorized manner?

Question 5

Consider a secure communication protocol that uses a combination of symmetric and asymmetric cryptography. If Alice wants to send a confidential message to Bob, and they first establish a shared symmetric key using an asymmetric key exchange protocol, what is the primary reason for using the symmetric key for the actual message encryption?
Cybersecurity Quiz — Computer Engineering | A-Warded