سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

12th Grade

19 Qs

quiz-placeholder

Similar activities

Jaringan Komputer XII Ganjil

Jaringan Komputer XII Ganjil

11th Grade - University

21 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

PRE TEST Basic Cyber Security

PRE TEST Basic Cyber Security

12th Grade

20 Qs

CyPS MCQ 05

CyPS MCQ 05

12th Grade

20 Qs

ITS 105 Cybersecurity - Objective - 1.3 - Security Principals

ITS 105 Cybersecurity - Objective - 1.3 - Security Principals

9th - 12th Grade

22 Qs

IoT Protocols Quiz

IoT Protocols Quiz

12th Grade

15 Qs

ISO 27001 Quiz

ISO 27001 Quiz

12th Grade

15 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

Assessment

Quiz

Information Technology (IT)

12th Grade

Practice Problem

Hard

Created by

mahdi mahdi

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which option is used to validate asymmetric keys?

Password

Digital Signature

DMZ

MAC Address

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the order of messages in establishing a TCP session?

SYN, SYN/ACK, ACK

SYN, ACK, SYN, ACK

SYN/ACK, SYN/ACK

SYN, SYN, ACK, ACK

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three fundamental principles of information security?

Integrity

Confidentiality

Availability

Privacy

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does layer 3 of the OSI model correspond to?

Packet

Bits

Segment

Data

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which network protocol is used to convert domain names to IP addresses?

DNS

DHCP

NetBios

LLMNR

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In asymmetric encryption, any message encrypted with the public key can only be decrypted with the corresponding private key.

True

False

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the attack that uses computational power to try all possible keys and passwords?

Replay Attack

Dictionary Attack

Brute-force Attack

Birthday Attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?