Sheeesh

Sheeesh

University

24 Qs

quiz-placeholder

Similar activities

COMPROBACIÓN DE LOGROS 3RO PILAS BLOQUES

COMPROBACIÓN DE LOGROS 3RO PILAS BLOQUES

University

19 Qs

Bloque I Mi marca personal

Bloque I Mi marca personal

5th Grade - University

20 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

BD 1 - SQL - geral

BD 1 - SQL - geral

University

20 Qs

Informática Aplicada I

Informática Aplicada I

University

20 Qs

Sesion 1 Curso LPIC 2023

Sesion 1 Curso LPIC 2023

University

20 Qs

Acumulativa Período 1

Acumulativa Período 1

8th Grade - University

21 Qs

Conociendo la Computadora

Conociendo la Computadora

7th Grade - University

20 Qs

Sheeesh

Sheeesh

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Ana G

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Un atac de tip spoofing este un atac impotriva carei componente a securitatii?

Toate variantele

Confidentialitatea

Integritatea

Disponibilitatea

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Ce componenta a securitatii este afectata atunci cand cineva foloseste un ciocan pentru a distruge un calculator?

Confidentialitatea

Integritatea

Disponibilitatea

Toate variantele

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Florin trimite un email iar compania la care lucreaza doreste sa dovedeasca acest lucru. Ce concept trebuie sa implementeze in interiorul companiei?

Integritate

Confidentialitate

Autentificare

Non-repudiere

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Care dintre urmatorii algoritmi foloseste o cheie simetrica si un algoritm de hash?

HMAC

SHA2

RSA

3DES

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In urma unei investigatii a fost descoperita o poza care continea informatii clasificate. Ce metoda a folosit atacatorul pentru a exfiltra informatii prin retea?

Steganografie

Incapsularea datelor

Deschiderea de socketi

Criptare

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Care dintre urmatoarele scheme criptografice poate fi folosita pentru a oferi "trusted timestamp"?

SHA256

AES256

RSA256

SCA

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Care dintre urmatoarele mecanisme hardware sunt folosite pentru a oferi pornirea securizata a unui sistem de operare (secure boot)?

Trusted Platform Module (TPM)

Address Space Layout Randomization (ASLR)

ARM TrustZone

Intel Software Guard Extensions (SGX)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?