سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

12th Grade

19 Qs

quiz-placeholder

Similar activities

QUIZZ blockchain

QUIZZ blockchain

9th - 12th Grade

17 Qs

Quiz Penilaian Harian Informatika

Quiz Penilaian Harian Informatika

12th Grade - University

23 Qs

Cyber Threat Intelligence Quiz

Cyber Threat Intelligence Quiz

12th Grade

20 Qs

Chapter 2 Physical Layer Revision

Chapter 2 Physical Layer Revision

12th Grade

18 Qs

Computer Networks Quiz

Computer Networks Quiz

12th Grade

15 Qs

Flaws of Artificial Intelligence (AI)

Flaws of Artificial Intelligence (AI)

9th - 12th Grade

20 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Unit 1: Protecting The Network

Unit 1: Protecting The Network

9th - 12th Grade

24 Qs

سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

mahdi mahdi

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which option is used to validate asymmetric keys?

Password

Digital Signature

DMZ

MAC Address

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the order of messages in establishing a TCP session?

SYN, SYN/ACK, ACK

SYN, ACK, SYN, ACK

SYN/ACK, SYN/ACK

SYN, SYN, ACK, ACK

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three fundamental principles of information security?

Integrity

Confidentiality

Availability

Privacy

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does layer 3 of the OSI model correspond to?

Packet

Bits

Segment

Data

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which network protocol is used to convert domain names to IP addresses?

DNS

DHCP

NetBios

LLMNR

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In asymmetric encryption, any message encrypted with the public key can only be decrypted with the corresponding private key.

True

False

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the attack that uses computational power to try all possible keys and passwords?

Replay Attack

Dictionary Attack

Brute-force Attack

Birthday Attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?