سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

12th Grade

19 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

The Role of IETF & Network Protocols

The Role of IETF & Network Protocols

10th Grade - University

15 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Fundamentals of Cryptography Quiz

Fundamentals of Cryptography Quiz

12th Grade

15 Qs

Cyber 1 Networking FINAL

Cyber 1 Networking FINAL

9th - 12th Grade

20 Qs

Domain 4 Network Security

Domain 4 Network Security

12th Grade

20 Qs

PTS Genap Informatika Kelas XII

PTS Genap Informatika Kelas XII

12th Grade - University

20 Qs

PRE TEST Basic Cyber Security

PRE TEST Basic Cyber Security

12th Grade

20 Qs

سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

mahdi mahdi

Used 1+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which option is used to validate asymmetric keys?

Password

Digital Signature

DMZ

MAC Address

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the order of messages in establishing a TCP session?

SYN, SYN/ACK, ACK

SYN, ACK, SYN, ACK

SYN/ACK, SYN/ACK

SYN, SYN, ACK, ACK

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three fundamental principles of information security?

Integrity

Confidentiality

Availability

Privacy

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does layer 3 of the OSI model correspond to?

Packet

Bits

Segment

Data

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which network protocol is used to convert domain names to IP addresses?

DNS

DHCP

NetBios

LLMNR

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In asymmetric encryption, any message encrypted with the public key can only be decrypted with the corresponding private key.

True

False

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the attack that uses computational power to try all possible keys and passwords?

Replay Attack

Dictionary Attack

Brute-force Attack

Birthday Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)