Search Header Logo

Day 2 Review

Authored by Jessica Mehringer

Computers

10th - 12th Grade

Used 8+ times

Day 2 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a type of exploit where the attacker inserts malicious content into webpages to steal data, take control of computers, run malicious code or achieve a phishing scam.

MAC Address

Linux

OUI

Cross-Site Scripting

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

this is a physical component on a device that provides connectivity to a network.

Routing Table

Back End

NIC (network interface Card)

TLS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An operating system similar in concept to the Windows OS but used more often to host routers and webservers.

front end

pcap file

Linux

Hexidecimal

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a wireshark data capture file that contains packet information of network traffic

front end

back end

OUI

pcap file

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

transmission control protocol used to establish and maintain connections over a computer network.

NIC

TLS

TCP

IEEE

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TLS

Transport Layer Security

Transmission Control Protocol

Institute of Electrical and Electronic Engineers

Organization Unique Identifier

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a part of a process or system that is seen by the user and typically provides functionality to the user

pcap file

front end

back end

hexadecimal

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?