Search Header Logo

Cybersecurity Quiz

Authored by mahdi mahdi

Instructional Technology

12th Grade

Used 2+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is used to authenticate asymmetric keys? (cryptography)

Digital signature

MAC Address

Password

Demilitarized zone (DMZ)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages? (network)

SYN, ACK, SYN, ACK

SYN, SYN, ACK, ACK

SYN/ACK, SYN/ACK

SYN, SYN/ACK, ACK

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three? (information technology)

Privacy

Availability

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What Do We Have In Layer 3 Of OSI Model? (network)

Data

Segment

Packet

Bits

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following network protocols is used to resolve FQDNs to IP addresses? (network)

DHCP

NetBios

LLMNR

DNS

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have decided to implement an intrusion detection system on your network. You primarily are interested in the IDS being able to recognized known attack techniques. Which type of IDS should you choose? ( security technology)

Signature Based

Passive

Active

Anomaly Based

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In asymmetric encryption, any message encrypted with the use of a public key can only be decrypted by applying the same algorithm and a matching private key. (cryptography)

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology