
Segment Exam 2 Review
Authored by Whitney Washington
Specialty
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Concealing data by changing it into an unreadable form is called
encryption
protection
hiding
encoding
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the name of the device that controls a virtual machine?
Network
Client
Hypervisor
Guest
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
___________ is the process that uses ciphers or keys to decode ciphertext.
Decryption
Encryption
Hypervisor
Password
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What felony are cybercriminals typically charged with?
Wire fraud
Hacking
Spam
Spyware
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which free protocol analyzer would be used to capture network traffic or to analyze a capture file?
FTP
PPT
SSH
Wireshark
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What does a router do?
Store information
Forwards data packets along networks
Allows phone services to connect
Block unauthorized network traffic
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is used to inspect, allow and block network traffic?
Client
Firewall
Server
Password
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?