سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

12th Grade

19 Qs

quiz-placeholder

Similar activities

Understanding TCP and UDP Attacks (SRWE 3.7)

Understanding TCP and UDP Attacks (SRWE 3.7)

12th Grade

21 Qs

Domain 4 Network Security

Domain 4 Network Security

12th Grade

20 Qs

Kviz o metodama pristupa mreži

Kviz o metodama pristupa mreži

12th Grade

15 Qs

Networking Basics Quiz

Networking Basics Quiz

12th Grade

19 Qs

Lesson 5: Data Protection

Lesson 5: Data Protection

9th - 12th Grade

15 Qs

Domain 4 - Network Security

Domain 4 - Network Security

10th Grade - University

16 Qs

Quiz on OSI Model

Quiz on OSI Model

12th Grade

14 Qs

Understanding the OSI Model

Understanding the OSI Model

12th Grade

15 Qs

سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

mahdi mahdi

Used 1+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which option is used to validate asymmetric keys?

Password

Digital Signature

DMZ

MAC Address

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the order of messages in establishing a TCP session?

SYN, SYN/ACK, ACK

SYN, ACK, SYN, ACK

SYN/ACK, SYN/ACK

SYN, SYN, ACK, ACK

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three fundamental principles of information security?

Integrity

Confidentiality

Availability

Privacy

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does layer 3 of the OSI model correspond to?

Packet

Bits

Segment

Data

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which network protocol is used to convert domain names to IP addresses?

DNS

DHCP

NetBios

LLMNR

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In asymmetric encryption, any message encrypted with the public key can only be decrypted with the corresponding private key.

True

False

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the attack that uses computational power to try all possible keys and passwords?

Replay Attack

Dictionary Attack

Brute-force Attack

Birthday Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?