Practice Exam - 181 to End

Practice Exam - 181 to End

Assessment

Flashcard

Computers

9th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

20 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Passive security attacks or breaches include packets sniffer, wiretapping and

Back

Spoofing

Answer explanation

Spoofing is a passive security attack that involves impersonating another device or user to gain unauthorized access to information. Unlike denial of service or ping of death, it fits the category of passive attacks like packet sniffing and wiretapping.

2.

FLASHCARD QUESTION

Front

In_______, bits are borrowed from the host portion in order to create more networks there you

Back

Subnetting

Answer explanation

Subnetting is the process of dividing a network into smaller, manageable sub-networks by borrowing bits from the host portion of an IP address. This allows for the creation of more networks within the same address space.

3.

FLASHCARD QUESTION

Front

The ______ is a variation of digital subscribed line (DSL) technology that only works over a short distance.

Back

Asymmetric DSL (ADSL)

Answer explanation

Asymmetric DSL (ADSL) is designed for short distances, providing higher download speeds than upload speeds, making it suitable for residential use. Other options like VDSL and SDSL have different characteristics and distance limitations.

4.

FLASHCARD QUESTION

Front

What is the difference between logical network design and physical network design?

Back

Physical topology refers to the placement of various components, including device location and cable installation. Logical topology shows how data flows within a network, regardless of the physical design.

Answer explanation

The correct choice highlights that physical topology refers to the placement of components and cable installation, while logical topology describes how data flows within the network, independent of the physical layout.

5.

FLASHCARD QUESTION

Front

The purpose of a_______ is the seamless transmission of data between network segments.

Back

Bridge

Answer explanation

A bridge connects and facilitates communication between different network segments, allowing for seamless data transmission. Unlike switches and routers, which operate at different layers, bridges specifically handle data link layer tasks.

6.

FLASHCARD QUESTION

Front

A Trojan horse is

Back

An application run to look like something else, and when downloaded and opened, it attacks the end user's computer from within.

Answer explanation

A Trojan horse disguises itself as a legitimate application. When downloaded and opened, it can compromise the user's computer, making the correct choice "An application run to look like something else, and when downloaded and opened, it attacks the end users computer from within."

7.

FLASHCARD QUESTION

Front

A Denial of Service

Back

An application run to deny service to a website so that legitimate users cannot access the site, forcing the site to go down.

Answer explanation

A Denial of Service (DoS) attack aims to make a website unavailable to legitimate users by overwhelming it with traffic, thus forcing it to go down. This matches the correct answer choice.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?