سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

12th Grade

19 Qs

quiz-placeholder

Similar activities

IAS1 - LAP 6 - 3D

IAS1 - LAP 6 - 3D

12th Grade

14 Qs

Understanding Network Security Basics

Understanding Network Security Basics

12th Grade

15 Qs

Anes siagian XII sains 2

Anes siagian XII sains 2

12th Grade

18 Qs

IAS1 - LAP 1 Quiz

IAS1 - LAP 1 Quiz

12th Grade

20 Qs

The Role of IETF & Network Protocols

The Role of IETF & Network Protocols

10th Grade - University

15 Qs

Cyber 1 Networking FINAL

Cyber 1 Networking FINAL

9th - 12th Grade

20 Qs

Quiz 1 - Second Quarter

Quiz 1 - Second Quarter

12th Grade

15 Qs

CompTIA Network+ (Certification Exam N10-009) P3

CompTIA Network+ (Certification Exam N10-009) P3

12th Grade

24 Qs

سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

mahdi mahdi

Used 1+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which option is used to validate asymmetric keys?

Password

Digital Signature

DMZ

MAC Address

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the order of messages in establishing a TCP session?

SYN, SYN/ACK, ACK

SYN, ACK, SYN, ACK

SYN/ACK, SYN/ACK

SYN, SYN, ACK, ACK

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three fundamental principles of information security?

Integrity

Confidentiality

Availability

Privacy

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does layer 3 of the OSI model correspond to?

Packet

Bits

Segment

Data

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which network protocol is used to convert domain names to IP addresses?

DNS

DHCP

NetBios

LLMNR

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In asymmetric encryption, any message encrypted with the public key can only be decrypted with the corresponding private key.

True

False

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the attack that uses computational power to try all possible keys and passwords?

Replay Attack

Dictionary Attack

Brute-force Attack

Birthday Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?