Search Header Logo

Segment Exam 2 Review

Authored by Whitney Washington

Specialty

10th Grade

Used 1+ times

Segment Exam 2 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Concealing data by changing it into an unreadable form is called

encryption

protection

hiding

encoding

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the name of the device that controls a virtual machine?

Network

Client

Hypervisor

Guest

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

___________ is the process that uses ciphers or keys to decode ciphertext.

Decryption

Encryption

Hypervisor

Password

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What felony are cybercriminals typically charged with?

Wire fraud

Hacking

Spam

Spyware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which free protocol analyzer would be used to capture network traffic or to analyze a capture file?

FTP

PPT

SSH

Wireshark

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does a router do?

Store information

Forwards data packets along networks

Allows phone services to connect

Block unauthorized network traffic

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is used to inspect, allow and block network traffic?

Client

Firewall

Server

Password

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?