Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

17 Qs

quiz-placeholder

Similar activities

Lesson 1 cybersecurity

Lesson 1 cybersecurity

9th - 12th Grade

13 Qs

CPA JYSS 2018 Prelims Paper 1

CPA JYSS 2018 Prelims Paper 1

7th Grade - Professional Development

20 Qs

Network Troubleshooting Methodology Quiz

Network Troubleshooting Methodology Quiz

12th Grade

20 Qs

Teknologi Layanan Jaringan XII / SMT-1

Teknologi Layanan Jaringan XII / SMT-1

12th Grade

20 Qs

MA Chapter 11: Business

MA Chapter 11: Business

12th Grade

12 Qs

Introduction to ICT

Introduction to ICT

11th Grade - University

15 Qs

Malware/ IOC

Malware/ IOC

10th Grade - Professional Development

20 Qs

Network Troubleshooting Quiz

Network Troubleshooting Quiz

12th Grade

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Instructional Technology

12th Grade

Easy

Created by

mahdi mahdi

Used 2+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is used to authenticate asymmetric keys? (cryptography)

Digital signature

MAC Address

Password

Demilitarized zone (DMZ)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages? (network)

SYN, ACK, SYN, ACK

SYN, SYN, ACK, ACK

SYN/ACK, SYN/ACK

SYN, SYN/ACK, ACK

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three? (information technology)

Privacy

Availability

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What Do We Have In Layer 3 Of OSI Model? (network)

Data

Segment

Packet

Bits

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following network protocols is used to resolve FQDNs to IP addresses? (network)

DHCP

NetBios

LLMNR

DNS

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have decided to implement an intrusion detection system on your network. You primarily are interested in the IDS being able to recognized known attack techniques. Which type of IDS should you choose? ( security technology)

Signature Based

Passive

Active

Anomaly Based

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key. (cryptography)

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?