
سوالات امنیت فناوری و شبکه
Authored by mahdi mahdi
Information Technology (IT)
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which option is used to validate asymmetric keys?
Password
Digital Signature
DMZ
MAC Address
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the order of messages in establishing a TCP session?
SYN, SYN/ACK, ACK
SYN, ACK, SYN, ACK
SYN/ACK, SYN/ACK
SYN, SYN, ACK, ACK
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the three fundamental principles of information security?
Integrity
Confidentiality
Availability
Privacy
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What does layer 3 of the OSI model correspond to?
Packet
Bits
Segment
Data
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which network protocol is used to convert domain names to IP addresses?
DNS
DHCP
NetBios
LLMNR
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In asymmetric encryption, any message encrypted with the public key can only be decrypted with the corresponding private key.
True
False
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the attack that uses computational power to try all possible keys and passwords?
Replay Attack
Dictionary Attack
Brute-force Attack
Birthday Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?