Question#1 In a DDoS attack, compromised computer systems are used as sources of attack ____? a) defense b) traffic ✅ - Answer c) encryption d) prevention Question#2 Layer 7 of the OSI model, where DDoS attacks are common, is the _____ layer? a) network b) application ✅ - Answer c) transport d) session Question#3 A group of bots used in DDoS attacks is called a _____? a) cluster b) botnet ✅ - Answer c) swarm d) network Question#4 Malware requires _____ on the part of the user to be installed on the target device? a) encryption b) a firewall c) an action ✅ - Answer d) no action Question#5 In a MITM attack, the attacker illicitly modifies or accesses the message before it reaches its _____? a) source b) destination ✅ - Answer c) encryption d) firewall Question#6 In the context of phishing, checking the parameters for 'reply-to' is crucial for identifying _____ activity? a) legitimate b) malicious ✅ - Answer c) encrypted d) secure Question#7 SQL injection attacks exploit applications that don't properly _____ inputs before passing them to SQL? a) encrypt b) validate ✅ - Answer c) decrypt d) hide Question#8 In session hijacking, the attacker substitutes their _____ address for that of the client computer? a) mac b) ip ✅ - Answer c) dns d) url Question#9 Limiting employee access to sensitive systems is a key method to prevent _____ threats? a) external b) insider ✅ - Answer c) malware d) phishing Question#10 Ransomware encrypts the target's _____ , denying access until a ransom is paid? a) firewall b) workstation ✅ - Answer c) network d) website Question#11 DNS spoofing involves redirecting users to a _____ website disguised as a real one? a) secure b) fake ✅ - Answer c) encrypted d) updated Question#12 Cryptography secures information by using _____ to convert messages making them hard to decode? a) algorithms ✅ - Answer b) plaintexts c) ciphers d) networks Question#13 In symmetric cipher, the _____ key is input to the encryption algorithm? a) public b) private c) secret ✅ - Answer d) hashing Question#14 Recovering the key is the primary objective when attacking an _____ system? a) encrypted b) conventional ✅ - Answer c) hashing d) asymmetric Question#15 Trying every possible key to decrypt a ciphertext is known as _____ attack? a) cryptanalysis b) brute-force ✅ - Answer c) phishing d) injection Question#16 AES, Blowfish are the most popular _____ key cryptography systems? a) asymmetric b) symmetric ✅ - Answer c) hashing d) dns Question#17 In asymmetric key cryptography, each user encrypts and decrypts using a pair of _____? a) algorithms b) keys ✅ - Answer c) networks d) firewalls Question#18 In asymmetric key cryptography, the _____ key is distributed across the network? a) private b) public ✅ - Answer c) secret d) session Question#19 The hash function cryptography operates in a _____ scenario? a) two-way b) one-way ✅ - Answer c) encrypted d) symmetric Question#20 MD5 and SHA are the commonly used _____ algorithms? a) encryption b) hashing ✅ - Answer c) decryption d) spoofing