Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

17 Qs

quiz-placeholder

Similar activities

CompTIA A+ Acronyms Quiz

CompTIA A+ Acronyms Quiz

12th Grade

20 Qs

IT (Information technology) - Adérito Neto PI0919

IT (Information technology) - Adérito Neto PI0919

10th Grade - Professional Development

20 Qs

บทที่ 3 มาตรฐานการเชื่อมต่อระบบเครือข่าย

บทที่ 3 มาตรฐานการเชื่อมต่อระบบเครือข่าย

12th Grade

20 Qs

Subnetting

Subnetting

11th - 12th Grade

19 Qs

Astudia Educational Workshop- GST and GIS

Astudia Educational Workshop- GST and GIS

6th Grade - University

21 Qs

Chapter 10 Cyber Security 14q

Chapter 10 Cyber Security 14q

9th - 12th Grade

14 Qs

Vehicle Telematics

Vehicle Telematics

12th Grade - Professional Development

15 Qs

LET Gen Ed ICT Quiz

LET Gen Ed ICT Quiz

11th Grade - Professional Development

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Instructional Technology

12th Grade

Easy

Created by

mahdi mahdi

Used 2+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is used to authenticate asymmetric keys? (cryptography)

Digital signature

MAC Address

Password

Demilitarized zone (DMZ)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages? (network)

SYN, ACK, SYN, ACK

SYN, SYN, ACK, ACK

SYN/ACK, SYN/ACK

SYN, SYN/ACK, ACK

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three? (information technology)

Privacy

Availability

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What Do We Have In Layer 3 Of OSI Model? (network)

Data

Segment

Packet

Bits

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following network protocols is used to resolve FQDNs to IP addresses? (network)

DHCP

NetBios

LLMNR

DNS

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have decided to implement an intrusion detection system on your network. You primarily are interested in the IDS being able to recognized known attack techniques. Which type of IDS should you choose? ( security technology)

Signature Based

Passive

Active

Anomaly Based

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key. (cryptography)

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology