Search Header Logo

Networking Fundamentals Ch 15 (Part 1)

Authored by Steven Hahn

10th - 12th Grade

Used 7+ times

Networking Fundamentals Ch 15 (Part 1)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

There are three types of hackers: _____-hat, _____-hat, and _____-hat.

black

white

grey

purple

blue

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Th e two main elements of security are _____ and _____.

authentication

encryption

secrecy

integration

availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption requires the use of a(n) _____ to encode data

algorithm

program

key

cipher

computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Th e term _____ is used to describe the manipulation of personnel to gain access to a secure system.

social engineering

imagineering

blackmail

coercion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Th e _____ utility can be used to check for open ports.

netstat

trace route

ipconfig

ping

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ is a standard developed by IEEE that recommends how to design a device that automatically detects other devices on the same network or on a nearby network segment.

Zero Configuation

Ident

IPSec

Netfind

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DoS stands for

Denial of Service

Disk operating system

Double Operarting Standard

Dual Optical System

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?