اختبار تجريبي وحدة امن المعلومات

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Reema Baghdadi
R
Reema Baghdadi
Community Contributor
Quizzes Created: 1 | Total Attempts: 6,492
Questions: 13 | Attempts: 6,684

SettingsSettingsSettings
اختبار تجريبي وحدة امن المعلومات - Quiz

.


Questions and Answers
  • 1. 

    التشفير الغير متماثل يعتمد على مفتاح واحد للتشفير

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    As per the given statement, "التشفير الغير متماثل يعتمد على مفتاح واحد للتشفير" (Asymmetric encryption relies on one key for encryption), the correct answer is false. This statement is incorrect because asymmetric encryption, also known as public-key encryption, uses a pair of keys - a public key for encryption and a private key for decryption. The public key is widely distributed, while the private key is kept secret by the owner. This dual-key system ensures secure communication and authentication.

    Rate this question:

  • 2. 

    بقاء المعلومة متوفره للمستخدم مع امكانية الوصول اليها هي

    • A.

      السريه

    • B.

      السلامه

    • C.

      التوافر والاتاحة

    Correct Answer
    C. التوافر والاتاحة
    Explanation
    The correct answer is "التوافر والاتاحة" which translates to "availability and accessibility." This means that the information is both present and easily accessible to the user. It implies that the information is not only stored securely, but also readily available for the user to access whenever they need it.

    Rate this question:

  • 3. 

    مفتاح التشفير الذي يتكون من 8 خانات هو في نظام  التشفير 

    • A.

      128 Bit WEP 

    • B.

      64 Bit WEP 

    • C.

      WPA

    Correct Answer
    C. WPA
    Explanation
    WPA (Wi-Fi Protected Access) is the correct answer because it is a wireless security protocol that uses encryption keys consisting of 8 characters. WPA was introduced as a replacement for the less secure WEP (Wired Equivalent Privacy) protocol. It provides stronger security measures, including the use of Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES) encryption algorithms. WPA is commonly used to secure wireless networks and protect against unauthorized access and data theft.

    Rate this question:

  • 4. 

    علامة أو برهان الكتروني يضاف للملفات  يحتوي على قيمة خوارزمية فريدة تمثل بصمة خاصة للملف

    • A.

      التوقيع الرقمي

    • B.

      الشهادة الرقمية

    • C.

      التشفير

    Correct Answer
    A. التوقيع الرقمي
    Explanation
    The correct answer is "التوقيع الرقمي" (Digital Signature). A digital signature is an electronic mark that is added to files and contains a unique algorithmic value that represents a unique fingerprint for the file. It is used to verify the authenticity and integrity of the file, ensuring that it has not been tampered with or altered.

    Rate this question:

  • 5. 

    من المهم وضع كلمة مرور على الشبكات اللاسلكية في البيت او العمل

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is important to set a password on wireless networks at home or work to ensure the security and privacy of the network. Without a password, anyone within range can access the network and potentially steal sensitive information or cause harm. Setting a password adds an extra layer of protection and restricts access to authorized users only.

    Rate this question:

  • 6. 

    يجب الحذر من الذين يتصلون لجمع المعلومات الشخصية مهما اعطو من ضمانات وتبريرات

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is advising caution when it comes to individuals who contact us to collect personal information, regardless of the guarantees and justifications they may provide. This implies that we should be wary of sharing our personal information with others, even if they seem trustworthy or provide assurances. Therefore, the correct answer is "True."

    Rate this question:

  • 7. 

    من انواع الفيروسات ويكون مرفقا مع برنامج دون علم المستخدم لسرقة البيانات

    • A.

      الدودة

    • B.

      حصان طروادة

    • C.

      التنصت

    Correct Answer
    B. حصان طروادة
  • 8. 

    تعتبر كلمة المرور التالية  F32ADPDEZ7 غير صحيحه في نظام التشفير WEP  لانها

    • A.

      تجاوزت العدد المسموح

    • B.

      احتوت ارقام خاطئة

    • C.

      احتوت احرف خاطئة

    Correct Answer
    C. احتوت احرف خاطئة
    Explanation
    The given password "F32ADPDEZ7" is incorrect in the WEP encryption system because it contains incorrect characters.

    Rate this question:

  • 9. 

    تعتبر الشهادة الرقمية علامة وبرهان أن الملف المرسل لم يتعرض للتزييف والتعديل

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. The correct answer is false because a digital certificate is not a guarantee that the file has not been tampered with or modified. A digital certificate is used to verify the authenticity and integrity of the sender, not the content of the file itself. It ensures that the sender is who they claim to be and that the message has not been altered during transmission. However, it does not provide any guarantee about the content of the file being genuine or unaltered.

    Rate this question:

  • 10. 

    يعتبر من انواع الاختراق

    • A.

      التجسس

    • B.

      الدودة

    • C.

      حصان طروادة

    • D.

      الفايروسات

    Correct Answer
    A. التجسس
    Explanation
    The correct answer is "التجسس" (Espionage). This is because the question asks for a type of hacking, and "التجسس" refers to the act of spying or gathering information covertly. It is a form of hacking where unauthorized individuals gain access to sensitive information without the knowledge or consent of the owner.

    Rate this question:

  • 11. 

    يعتبر الشراء عبر الانستقرام وسيلة تسوق عبر الاسواق الالكترونية

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement suggests that buying through Instagram is a way of shopping through electronic markets. However, this is not true. While Instagram may be used as a platform for advertising and selling products, it is not considered a dedicated electronic marketplace like Amazon or eBay. Therefore, the correct answer is false.

    Rate this question:

  • 12. 

    تعتبر خدمة سداد المخالفات المرورية تعامل بين

    • A.

      حكومة وحكومةG2G

    • B.

      G2C حكومة ومواطن

    • C.

      حكومة وأعمالG2B

    • D.

      أعمال واعمالB2B

    Correct Answer
    B. G2C حكومة ومواطن
    Explanation
    The correct answer is G2C, which stands for Government to Citizen. This is because the service of paying traffic violations involves a transaction between the government (represented by the traffic department) and the citizens who have committed the violations. The government provides a platform or service for citizens to pay their fines and settle their traffic violations.

    Rate this question:

  • 13. 

     الشراء من جولي شيك يعتبر من التعاملات التجارية بين 

    • A.

      عميل لعميلC2C

    • B.

      تاجر لعميل B2C

    • C.

      تاجر لتاجرB2B

    • D.

      عميل لتاجرC2B

    Correct Answer
    B. تاجر لعميل B2C
    Explanation
    The correct answer is "تاجر لعميل B2C" because buying from Jolly Chic involves a transaction between a merchant (تاجر) and a customer (عميل) in a business-to-customer (B2C) relationship. In this case, Jolly Chic is the merchant selling products to individual customers.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 09, 2018
    Quiz Created by
    Reema Baghdadi
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.