Network Security -- ENSA Module 3

Network Security -- ENSA Module 3

11th Grade - University

21 Qs

quiz-placeholder

Similar activities

Understanding Computer Hardware

Understanding Computer Hardware

8th Grade - University

20 Qs

Computer Hardware and Software Quiz

Computer Hardware and Software Quiz

12th Grade

19 Qs

Input and Output Devices

Input and Output Devices

11th Grade

18 Qs

CPU

CPU

9th - 11th Grade

17 Qs

python intro

python intro

4th - 12th Grade

17 Qs

Networks

Networks

8th Grade - University

20 Qs

Early Programming

Early Programming

9th - 12th Grade

20 Qs

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

Network Security -- ENSA Module 3

Network Security -- ENSA Module 3

Assessment

Quiz

Computers

11th Grade - University

Medium

Created by

Sandy Thomaschek

Used 182+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a forensic tool?

used to sniff out evidence on a computer.

specially designed operating systems preloaded with tools optimized for hacking.

used to capture and analyze packets.

used to reverse engineer binary files.

used to discover a computer's vulnerabilities.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hacking operating system?

used to sniff out evidence on a computer.

specially designed operating systems preloaded with tools optimized for hacking.

used to capture and analyze packets.

used to reverse engineer binary files.

used to discover a computer's vulnerabilities.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a packet sniffer?

used to sniff out evidence on a computer.

specially designed operating systems preloaded with tools optimized for hacking.

used to capture and analyze packets.

used to reverse engineer binary files.

used to discover a computer's vulnerabilities.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a debugger?

used to sniff out evidence on a computer.

specially designed operating systems preloaded with tools optimized for hacking.

used to capture and analyze packets.

used to reverse engineer binary files.

used to discover a computer's vulnerabilities.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a fuzzer?

used to sniff out evidence on a computer.

specially designed operating systems preloaded with tools optimized for hacking.

used to capture and analyze packets.

used to reverse engineer binary files.

used to discover a computer's vulnerabilities.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which applications are examples of network scanning tools? (choose 3)

Nmap

SuperScan

NetScan

Medusa

John the Ripper

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which applications are examples of password crackers? (choose 2)

Nmap

SuperScan

NetScan

Medusa

John the Ripper

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?