Search Header Logo

CyberSecurity EOC Vocab Pt 2

Authored by Allison Hall

Computers

9th - 12th Grade

Used 1+ times

CyberSecurity EOC Vocab Pt 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

75 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A unique numeric code that is assigned to networking hardware components. The code is assigned by the manufacturer, includes their unique identification number, and never changes.

MAC address
log file
cyberteam
environment variable

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Software that is intended to do harm or damage

malware
Linux
cryptography
encryption key

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The output (called the hash value or hash) that is generated by a hash function.

messages digest
Least Significant Bit (LSB)
cryptocurrency
encryption

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Finds the remainder of a division.

modulus
LAN
cross-site scripting
email source

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The maximum amount of btyes than can be packaged into frame data.

MTU
ipconfig
crack
ecommerce

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A method of re-mapping IP addresses to a single IP address, usually a router.

NAT
IP address
cookie
DoS/DDoS attack

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A virtual machine or simulated computer that runs on a host computer.

network security cloud lab
integrity (in CIA triad)
container
domain name

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?