Sheeesh

Sheeesh

University

24 Qs

quiz-placeholder

Similar activities

Megaquizizz de Juegos

Megaquizizz de Juegos

University

25 Qs

Analisis y diseño de sistemas

Analisis y diseño de sistemas

University

20 Qs

Sistemas GNU LInux v2

Sistemas GNU LInux v2

University

20 Qs

AMD Y INTEL

AMD Y INTEL

University - Professional Development

20 Qs

Refuerzo Examen Final HEINF_2024 II

Refuerzo Examen Final HEINF_2024 II

University

20 Qs

Desarrollo Web

Desarrollo Web

University

20 Qs

POO_BasicoyJava

POO_BasicoyJava

University

20 Qs

Bloque 3: Programación de dispositivos

Bloque 3: Programación de dispositivos

University

20 Qs

Sheeesh

Sheeesh

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Ana G

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Un atac de tip spoofing este un atac impotriva carei componente a securitatii?

Toate variantele

Confidentialitatea

Integritatea

Disponibilitatea

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Ce componenta a securitatii este afectata atunci cand cineva foloseste un ciocan pentru a distruge un calculator?

Confidentialitatea

Integritatea

Disponibilitatea

Toate variantele

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Florin trimite un email iar compania la care lucreaza doreste sa dovedeasca acest lucru. Ce concept trebuie sa implementeze in interiorul companiei?

Integritate

Confidentialitate

Autentificare

Non-repudiere

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Care dintre urmatorii algoritmi foloseste o cheie simetrica si un algoritm de hash?

HMAC

SHA2

RSA

3DES

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In urma unei investigatii a fost descoperita o poza care continea informatii clasificate. Ce metoda a folosit atacatorul pentru a exfiltra informatii prin retea?

Steganografie

Incapsularea datelor

Deschiderea de socketi

Criptare

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Care dintre urmatoarele scheme criptografice poate fi folosita pentru a oferi "trusted timestamp"?

SHA256

AES256

RSA256

SCA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Care dintre urmatoarele mecanisme hardware sunt folosite pentru a oferi pornirea securizata a unui sistem de operare (secure boot)?

Trusted Platform Module (TPM)

Address Space Layout Randomization (ASLR)

ARM TrustZone

Intel Software Guard Extensions (SGX)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?