CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
Authentication
1. What is authentication in the context of cybersecurity?
a) Verifying the identity of a user or system
b) Protecting data from unauthorized access
c) Encrypting sensitive information
d) Monitoring network traffic
Answer: a
Explanation: Authentication is the process of verifying the identity of a user, device, or system
before granting access to resources.
2. Which of the following is an example of two-factor authentication?
a) Password and username
b) Password and fingerprint
c) PIN only
d) Username only
Answer: b
Explanation: Two-factor authentication requires two different types of credentials, such as a
password (something you know) and a fingerprint (something you have).
3. What does the term "multi-factor authentication" (MFA) mean?
a) Using multiple passwords for security
b) Verifying identity through multiple independent factors
c) Encrypting all data during transmission
d) Using a single strong password
Answer: b
Explanation: MFA strengthens security by requiring verification from multiple independent
categories, such as knowledge, possession, or biometrics.
4. Which of these is an example of something you have in authentication?
a) Password b) Fingerprint c) Security token d) Security question
Answer: c
Explanation: "Something you have" refers to physical or digital objects like security tokens, access
cards, or smartphones.
5. What is the primary purpose of a password in authentication?
a) Encrypting user data b) Verifying the identity of a user
c) Storing sensitive information securely d) Monitoring user activity
Answer: b
Explanation: A password is a secret piece of information used to verify a user’s identity during the
authentication process.
6. What is biometric authentication?
a) Using a password for access
b) Verifying identity using unique physical or behavioral characteristics
c) Encrypting sensitive information
d) Monitoring network activity
Answer: b
Explanation: Biometric authentication involves using unique traits like fingerprints, facial
recognition, or voice patterns to verify identity.
7. What does a CAPTCHA test verify?
a) The strength of a password b) Whether the user is human or a bot
c) The validity of an email address d) The security of a network connection
Answer: b
Explanation: CAPTCHAs are used to distinguish human users from automated bots by presenting
tasks that are easy for humans but difficult for bots.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
8. What is single sign-on (SSO)?
a) Using multiple passwords for security
b) Allowing users to authenticate once and access multiple systems
c) An outdated authentication method
d) A method to encrypt passwords
Answer: b
Explanation: SSO allows users to authenticate once and access multiple related systems or
applications without re-entering credentials.
9. Which protocol is commonly used for secure authentication in websites?
a) HTTP
b) FTP
c) OAuth
d) UDP
Answer: c
Explanation: OAuth is a widely used protocol for secure user authentication and authorization in
web applications.
10. What does the term "identity provider" refer to?
a) A database for storing user credentials
b) A service that authenticates users and provides identity information
c) A network monitoring tool
d) A method of data encryption
Answer: b
Explanation: An identity provider (IdP) is a service that verifies user identities and provides
authentication tokens to applications.
11. Which of the following is a strong password characteristic?
a) Contains only letters
b) Uses a mix of uppercase, lowercase, numbers, and symbols
c) Is shorter than 6 characters
d) Includes personal information like birthdates
Answer: b
Explanation: Strong passwords are complex and include a combination of uppercase, lowercase
letters, numbers, and special characters.
12. What is an authentication token?
a) A type of encrypted file
b) A temporary credential used for verifying identity
c) A hardware security device
d) A password stored in plain text
Answer: b
Explanation: An authentication token is a digital object that serves as proof of identity, often used in
web applications.
13. What is the role of a username in authentication?
a) To encrypt the password b) To identify the user in the system
c) To verify the identity of the user d) To store user credentials securely
Answer: b
Explanation: A username uniquely identifies a user within a system, while authentication verifies
their identity.
14. What is the main advantage of using biometrics for authentication?
a) Biometrics are easy to share with others
b) They provide a higher level of security than traditional methods
c) They require no specialized equipment
d) They can be easily reset or changed
Answer: b
Explanation: Biometrics offer enhanced security because they are unique to each individual and
difficult to replicate.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
15. What is session-based authentication?
a) A method that uses encryption to secure passwords
b) Authentication tied to a user session, often via cookies or tokens
c) A method requiring re-authentication for every request
d) A biometric-based authentication system
Answer: b
Explanation: Session-based authentication uses session tokens or cookies to maintain a user’s
authenticated state during their interaction with a system.
16. What is password hashing?
a) Encrypting a password for secure storage
b) Verifying a password during login
c) Transforming a password into a fixed-length string for secure storage
d) Changing a password periodically
Answer: c
Explanation: Password hashing involves converting a password into a fixed-length hash, which is
stored securely to prevent exposure of plaintext passwords.
17. What is the purpose of a password salt?
a) To encrypt the password
b) To make hashed passwords unique and resist dictionary attacks
c) To store the password securely
d) To create a backup of the password
Answer: b
Explanation: Adding a salt to a password ensures that even if two users have the same password,
their hash values will differ.
18. Which attack aims to guess a user’s password by trying all possible combinations?
a) Phishing attack b) Brute force attack
c) Man-in-the-Middle attack d) Dictionary attack
Answer: b
Explanation: Brute force attacks systematically attempt all possible password combinations until the
correct one is found.
19. What is an example of "something you know" in authentication?
a) Password b) Fingerprint c) Security token d) Facial recognition
Answer: a
Explanation: "Something you know" refers to information like passwords or PINs used for
authentication.
20. What is time-based one-time password (TOTP) authentication?
a) A password that remains the same indefinitely
b) A password that changes after a set period of time
c) A password linked to a physical token
d) A single-use password for guest accounts
Answer: b
Explanation: TOTP generates a unique password that changes after a fixed duration, enhancing
security.
21. What is a federated authentication system?
a) A system that encrypts user credentials
b) A single authentication system shared across multiple organizations
c) A system for encrypting data in transit
d) A method of password recovery
Answer: b
Explanation: Federated authentication allows multiple organizations to share a common
authentication process, enabling users to access resources across these organizations with a single
login.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
22. Which of the following is a risk of weak authentication methods?
a) Faster login times
b) Increased vulnerability to unauthorized access
c) Enhanced user experience
d) Better compatibility with older systems
Answer: b
Explanation: Weak authentication methods make it easier for attackers to compromise user accounts
and access sensitive information.
23. What does SAML stand for in authentication?
a) Secure Authentication Markup Language
b) Security Assertion Markup Language
c) System Authentication and Management Language
d) Secure Authorization and Management Language
Answer: b
Explanation: SAML (Security Assertion Markup Language) is an open standard for exchanging
authentication and authorization data between parties.
24. What is the purpose of account lockout policies?
a) To simplify user authentication
b) To temporarily disable accounts after multiple failed login attempts
c) To encrypt user credentials
d) To store user passwords securely
Answer: b
Explanation: Account lockout policies help prevent unauthorized access by locking an account after
several incorrect login attempts.
25. Which type of authentication uses an SMS code sent to a user’s phone?
a) Password-based authentication b) Biometric authentication
c) Token-based authentication d) One-time password (OTP) authentication
Answer: d
Explanation: OTP authentication generates a one-time code, often sent via SMS, for secure
verification.
26. What is mutual authentication?
a) Verifying both the user and the server’s identities
b) Using multiple passwords for added security
c) Encrypting all data before transmission
d) Sharing credentials between systems
Answer: a
Explanation: Mutual authentication ensures that both the user and the server authenticate each other,
adding an extra layer of trust and security.
27. What does LDAP stand for in authentication?
a) Lightweight Directory Access Protocol b) Local Device Authentication Protocol
c) Logical Data Access Process d) Linked Data Authentication Protocol
Answer: a
Explanation: LDAP (Lightweight Directory Access Protocol) is used for accessing and managing
directory information, including authentication.
28. Which of the following is an example of out-of-band authentication?
a) Entering a password only
b) Receiving a phone call or SMS code to verify identity
c) Using a username and PIN combination
d) Logging in through a VPN
Answer: b
Explanation: Out-of-band authentication uses a separate communication channel, such as a phone
call or SMS, to verify a user’s identity.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315
CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
29. What is the primary benefit of using single sign-on (SSO)?
a) Enhanced password complexity
b) Reduced number of logins required for multiple systems
c) Increased frequency of authentication
d) Improved encryption of passwords
Answer: b
Explanation: SSO simplifies the user experience by allowing access to multiple systems with one
set of credentials, reducing login fatigue.
30. What is a hardware security key used for in authentication?
a) Encrypting user data
b) Storing passwords securely
c) Providing a physical, tamper-proof device for identity verification
d) Managing network connections
Answer: c
Explanation: Hardware security keys are physical devices that generate or store cryptographic keys,
offering a tamper-proof means of authentication.
D.Sundaravel M.Sc.B.Ed(cs) -9751894315