اختبار تجريبي وحدة امن المعلومات

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Reema Baghdadi
R
Reema Baghdadi
Community Contributor
Quizzes Created: 1 | Total Attempts: 7,639
| Attempts: 7,639 | : 13
Please wait...

Question 1 / 13
0 %
0/100
Score 0/100
1. من المهم وضع كلمة مرور على الشبكات اللاسلكية في البيت او العمل

Explanation

It is important to set a password on wireless networks at home or work to ensure the security and privacy of the network. Without a password, anyone within range can access the network and potentially steal sensitive information or cause harm. Setting a password adds an extra layer of protection and restricts access to authorized users only.

Submit
Please wait...
About This Quiz
اختبار تجريبي وحدة امن المعلومات - Quiz

Personalize your quiz and earn a certificate with your name on it!
2. يجب الحذر من الذين يتصلون لجمع المعلومات الشخصية مهما اعطو من ضمانات وتبريرات

Explanation

The given statement is advising caution when it comes to individuals who contact us to collect personal information, regardless of the guarantees and justifications they may provide. This implies that we should be wary of sharing our personal information with others, even if they seem trustworthy or provide assurances. Therefore, the correct answer is "True."

Submit
3. تعتبر خدمة سداد المخالفات المرورية تعامل بين

Explanation

The correct answer is G2C, which stands for Government to Citizen. This is because the service of paying traffic violations involves a transaction between the government (represented by the traffic department) and the citizens who have committed the violations. The government provides a platform or service for citizens to pay their fines and settle their traffic violations.

Submit
4. بقاء المعلومة متوفره للمستخدم مع امكانية الوصول اليها هي

Explanation

The correct answer is "التوافر والاتاحة" which translates to "availability and accessibility." This means that the information is both present and easily accessible to the user. It implies that the information is not only stored securely, but also readily available for the user to access whenever they need it.

Submit
5. التشفير الغير متماثل يعتمد على مفتاح واحد للتشفير

Explanation

As per the given statement, "التشفير الغير متماثل يعتمد على مفتاح واحد للتشفير" (Asymmetric encryption relies on one key for encryption), the correct answer is false. This statement is incorrect because asymmetric encryption, also known as public-key encryption, uses a pair of keys - a public key for encryption and a private key for decryption. The public key is widely distributed, while the private key is kept secret by the owner. This dual-key system ensures secure communication and authentication.

Submit
6.  الشراء من جولي شيك يعتبر من التعاملات التجارية بين 

Explanation

The correct answer is "تاجر لعميل B2C" because buying from Jolly Chic involves a transaction between a merchant (تاجر) and a customer (عميل) in a business-to-customer (B2C) relationship. In this case, Jolly Chic is the merchant selling products to individual customers.

Submit
7. من انواع الفيروسات ويكون مرفقا مع برنامج دون علم المستخدم لسرقة البيانات

Explanation

not-available-via-ai

Submit
8. يعتبر من انواع الاختراق

Explanation

The correct answer is "التجسس" (Espionage). This is because the question asks for a type of hacking, and "التجسس" refers to the act of spying or gathering information covertly. It is a form of hacking where unauthorized individuals gain access to sensitive information without the knowledge or consent of the owner.

Submit
9. مفتاح التشفير الذي يتكون من 8 خانات هو في نظام  التشفير 

Explanation

WPA (Wi-Fi Protected Access) is the correct answer because it is a wireless security protocol that uses encryption keys consisting of 8 characters. WPA was introduced as a replacement for the less secure WEP (Wired Equivalent Privacy) protocol. It provides stronger security measures, including the use of Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES) encryption algorithms. WPA is commonly used to secure wireless networks and protect against unauthorized access and data theft.

Submit
10. علامة أو برهان الكتروني يضاف للملفات  يحتوي على قيمة خوارزمية فريدة تمثل بصمة خاصة للملف

Explanation

The correct answer is "التوقيع الرقمي" (Digital Signature). A digital signature is an electronic mark that is added to files and contains a unique algorithmic value that represents a unique fingerprint for the file. It is used to verify the authenticity and integrity of the file, ensuring that it has not been tampered with or altered.

Submit
11. يعتبر الشراء عبر الانستقرام وسيلة تسوق عبر الاسواق الالكترونية

Explanation

The statement suggests that buying through Instagram is a way of shopping through electronic markets. However, this is not true. While Instagram may be used as a platform for advertising and selling products, it is not considered a dedicated electronic marketplace like Amazon or eBay. Therefore, the correct answer is false.

Submit
12. تعتبر كلمة المرور التالية  F32ADPDEZ7 غير صحيحه في نظام التشفير WEP  لانها

Explanation

The given password "F32ADPDEZ7" is incorrect in the WEP encryption system because it contains incorrect characters.

Submit
13. تعتبر الشهادة الرقمية علامة وبرهان أن الملف المرسل لم يتعرض للتزييف والتعديل

Explanation

The given statement is false. The correct answer is false because a digital certificate is not a guarantee that the file has not been tampered with or modified. A digital certificate is used to verify the authenticity and integrity of the sender, not the content of the file itself. It ensures that the sender is who they claim to be and that the message has not been altered during transmission. However, it does not provide any guarantee about the content of the file being genuine or unaltered.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 09, 2018
    Quiz Created by
    Reema Baghdadi
Cancel
  • All
    All (13)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
من المهم وضع كلمة مرور على الشبكات...
يجب الحذر من الذين يتصلون لجمع...
تعتبر خدمة سداد المخالفات المرورية...
بقاء المعلومة متوفره للمستخدم مع...
التشفير الغير متماثل يعتمد على مفتاح...
 الشراء من جولي شيك يعتبر من...
من انواع الفيروسات ويكون مرفقا مع...
يعتبر من انواع الاختراق
مفتاح التشفير الذي يتكون من 8 خانات هو...
علامة أو برهان الكتروني يضاف...
يعتبر الشراء عبر الانستقرام وسيلة...
تعتبر كلمة المرور التالية  ...
تعتبر الشهادة الرقمية علامة وبرهان أن...
Alert!

Advertisement