
Network Security -- ENSA Module 3
Authored by Sandy Thomaschek
Computers
11th Grade - University
Used 182+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a forensic tool?
used to sniff out evidence on a computer.
specially designed operating systems preloaded with tools optimized for hacking.
used to capture and analyze packets.
used to reverse engineer binary files.
used to discover a computer's vulnerabilities.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a hacking operating system?
used to sniff out evidence on a computer.
specially designed operating systems preloaded with tools optimized for hacking.
used to capture and analyze packets.
used to reverse engineer binary files.
used to discover a computer's vulnerabilities.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a packet sniffer?
used to sniff out evidence on a computer.
specially designed operating systems preloaded with tools optimized for hacking.
used to capture and analyze packets.
used to reverse engineer binary files.
used to discover a computer's vulnerabilities.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a debugger?
used to sniff out evidence on a computer.
specially designed operating systems preloaded with tools optimized for hacking.
used to capture and analyze packets.
used to reverse engineer binary files.
used to discover a computer's vulnerabilities.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a fuzzer?
used to sniff out evidence on a computer.
specially designed operating systems preloaded with tools optimized for hacking.
used to capture and analyze packets.
used to reverse engineer binary files.
used to discover a computer's vulnerabilities.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which applications are examples of network scanning tools? (choose 3)
Nmap
SuperScan
NetScan
Medusa
John the Ripper
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which applications are examples of password crackers? (choose 2)
Nmap
SuperScan
NetScan
Medusa
John the Ripper
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Teknologi Layanan Jaringan XI TKJ
Quiz
•
11th Grade
20 questions
1ºDAM/DAW - Entornos de Desarrollo - UD1-6 - Prof. C. Boni
Quiz
•
University - Professi...
20 questions
basisdata1
Quiz
•
University
18 questions
Memory-Mobo-Hard/Software
Quiz
•
University
20 questions
1.1.3 Proses Penyelesaian Masalah
Quiz
•
11th Grade
20 questions
PARC Linux Basic Part 2
Quiz
•
University
18 questions
SQL Quiz
Quiz
•
University
21 questions
Visual Basic Assessment
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade