1.
التشفير الغير متماثل يعتمد على مفتاح واحد للتشفير
Correct Answer
B. False
Explanation
As per the given statement, "التشفير الغير متماثل يعتمد على مفتاح واحد للتشفير" (Asymmetric encryption relies on one key for encryption), the correct answer is false. This statement is incorrect because asymmetric encryption, also known as public-key encryption, uses a pair of keys - a public key for encryption and a private key for decryption. The public key is widely distributed, while the private key is kept secret by the owner. This dual-key system ensures secure communication and authentication.
2.
بقاء المعلومة متوفره للمستخدم مع امكانية الوصول اليها هي
Correct Answer
C. التوافر والاتاحة
Explanation
The correct answer is "التوافر والاتاحة" which translates to "availability and accessibility." This means that the information is both present and easily accessible to the user. It implies that the information is not only stored securely, but also readily available for the user to access whenever they need it.
3.
مفتاح التشفير الذي يتكون من 8 خانات هو في نظام التشفير
Correct Answer
C. WPA
Explanation
WPA (Wi-Fi Protected Access) is the correct answer because it is a wireless security protocol that uses encryption keys consisting of 8 characters. WPA was introduced as a replacement for the less secure WEP (Wired Equivalent Privacy) protocol. It provides stronger security measures, including the use of Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES) encryption algorithms. WPA is commonly used to secure wireless networks and protect against unauthorized access and data theft.
4.
علامة أو برهان الكتروني يضاف للملفات يحتوي على قيمة خوارزمية فريدة تمثل بصمة خاصة للملف
Correct Answer
A. التوقيع الرقمي
Explanation
The correct answer is "التوقيع الرقمي" (Digital Signature). A digital signature is an electronic mark that is added to files and contains a unique algorithmic value that represents a unique fingerprint for the file. It is used to verify the authenticity and integrity of the file, ensuring that it has not been tampered with or altered.
5.
من المهم وضع كلمة مرور على الشبكات اللاسلكية في البيت او العمل
Correct Answer
A. True
Explanation
It is important to set a password on wireless networks at home or work to ensure the security and privacy of the network. Without a password, anyone within range can access the network and potentially steal sensitive information or cause harm. Setting a password adds an extra layer of protection and restricts access to authorized users only.
6.
يجب الحذر من الذين يتصلون لجمع المعلومات الشخصية مهما اعطو من ضمانات وتبريرات
Correct Answer
A. True
Explanation
The given statement is advising caution when it comes to individuals who contact us to collect personal information, regardless of the guarantees and justifications they may provide. This implies that we should be wary of sharing our personal information with others, even if they seem trustworthy or provide assurances. Therefore, the correct answer is "True."
7.
من انواع الفيروسات ويكون مرفقا مع برنامج دون علم المستخدم لسرقة البيانات
Correct Answer
B. حصان طروادة
8.
تعتبر كلمة المرور التالية
F32ADPDEZ7
غير صحيحه في نظام التشفير
WEP
لانها
Correct Answer
C. احتوت احرف خاطئة
Explanation
The given password "F32ADPDEZ7" is incorrect in the WEP encryption system because it contains incorrect characters.
9.
تعتبر الشهادة الرقمية علامة وبرهان أن الملف المرسل لم يتعرض للتزييف والتعديل
Correct Answer
B. False
Explanation
The given statement is false. The correct answer is false because a digital certificate is not a guarantee that the file has not been tampered with or modified. A digital certificate is used to verify the authenticity and integrity of the sender, not the content of the file itself. It ensures that the sender is who they claim to be and that the message has not been altered during transmission. However, it does not provide any guarantee about the content of the file being genuine or unaltered.
10.
يعتبر من انواع الاختراق
Correct Answer
A. التجسس
Explanation
The correct answer is "التجسس" (Espionage). This is because the question asks for a type of hacking, and "التجسس" refers to the act of spying or gathering information covertly. It is a form of hacking where unauthorized individuals gain access to sensitive information without the knowledge or consent of the owner.
11.
يعتبر الشراء عبر الانستقرام وسيلة تسوق عبر الاسواق الالكترونية
Correct Answer
B. False
Explanation
The statement suggests that buying through Instagram is a way of shopping through electronic markets. However, this is not true. While Instagram may be used as a platform for advertising and selling products, it is not considered a dedicated electronic marketplace like Amazon or eBay. Therefore, the correct answer is false.
12.
تعتبر خدمة سداد المخالفات المرورية تعامل بين
Correct Answer
B. G2C حكومة ومواطن
Explanation
The correct answer is G2C, which stands for Government to Citizen. This is because the service of paying traffic violations involves a transaction between the government (represented by the traffic department) and the citizens who have committed the violations. The government provides a platform or service for citizens to pay their fines and settle their traffic violations.
13.
الشراء من جولي شيك يعتبر من التعاملات التجارية بين
Correct Answer
B. تاجر لعميل B2C
Explanation
The correct answer is "تاجر لعميل B2C" because buying from Jolly Chic involves a transaction between a merchant (تاجر) and a customer (عميل) in a business-to-customer (B2C) relationship. In this case, Jolly Chic is the merchant selling products to individual customers.