
Networking Fundamentals Ch 15 (Part 1)
Authored by Steven Hahn
10th - 12th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
There are three types of hackers: _____-hat, _____-hat, and _____-hat.
black
white
grey
purple
blue
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Th e two main elements of security are _____ and _____.
authentication
encryption
secrecy
integration
availability
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Encryption requires the use of a(n) _____ to encode data
algorithm
program
key
cipher
computer
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Th e term _____ is used to describe the manipulation of personnel to gain access to a secure system.
social engineering
imagineering
blackmail
coercion
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Th e _____ utility can be used to check for open ports.
netstat
trace route
ipconfig
ping
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ is a standard developed by IEEE that recommends how to design a device that automatically detects other devices on the same network or on a nearby network segment.
Zero Configuation
Ident
IPSec
Netfind
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DoS stands for
Denial of Service
Disk operating system
Double Operarting Standard
Dual Optical System
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?