1) Is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network. a) Server b) Front End c) Back End d) Pcap File e) Hexadecimal f) OUI 2) A part of a process or system that is seen by the user and typically provides functionality to the user. a) Server b) Front End c) Back End d) Pcap File e) Hexadecimal f) OUI 3) A part of a process or system that is not seen by the user. It provides a supporting function on behalf of the main process. a) Server b) Front End c) Back End d) Pcap File e) Hexadecimal f) OUI 4) A Wireshark data capture file that contains packet information of network traffic. a) Server b) Front End c) Back End d) Pcap File e) Hexadecimal f) OUI 5) Often referred to as hex, hexadecimal is a base-16 number system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. You can also see hex numbers in all capitals A through F. a) Server b) Front End c) Back End d) Pcap File e) Hexadecimal f) OUI 6) The Organizationally Unique Identifier is the first half of the MAC address, designating the manufacturer of the network device. Each manufacturer has their own, individual OUI for each device they produce. a) Server b) Front End c) Back End d) Pcap File e) Hexadecimal f) OUI 7) A network interface card is a physical component on a computer or device that provides connectivity to a network. a) NIC b) Institute of Electrical and Electronic Engineers ( IEEE) c) Broadcasting d) TCP e) TCP Handshake f) OUITLS 8) They are best known for developing standards in the computer and electronics industries. a) NIC b) Institute of Electrical and Electronic Engineers ( IEEE) c) Broadcasting d) TCP e) TCP Handshake f) OUITLS 9) is a way for a computer to communicate with all hosts on a network using one message. It is most often used when a computer needs to find a host. a) NIC b) Institute of Electrical and Electronic Engineers ( IEEE) c) Broadcasting d) TCP e) TCP Handshake f) OUITLS 10) Transmission Control Protocol used to establish and maintain connections over a computer network. a) NIC b) Institute of Electrical and Electronic Engineers ( IEEE) c) Broadcasting d) TCP e) TCP Handshake f) OUITLS 11) A three-way communication method using SYN (synchronize), SYN-ACK (synchronize=acknowledge), and ACK (acknowledge) to establish a connection between hosts. a) NIC b) Institute of Electrical and Electronic Engineers ( IEEE) c) Broadcasting d) TCP e) TCP Handshake f) OUITLS 12) Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction. a) NIC b) Institute of Electrical and Electronic Engineers ( IEEE) c) Broadcasting d) TCP e) TCP Handshake f) TLS
0%
Lesson 2.3.3 Server Attacks
Teilen
Teilen
Teilen
von
Rtijam
High
CS
Computer Systems and Architecture
Networking and the Internet
Cybersecurity
Inhalt bearbeiten
Drucken
Einbetten
Mehr
Zuweisungen
Bestenliste
Mehr anzeigen
Weniger anzeigen
Diese Bestenliste ist derzeit privat. Klicke auf
Teilen
um sie öffentlich zu machen.
Diese Bestenliste wurde vom Eigentümer der Ressource deaktiviert.
Diese Bestenliste ist deaktiviert, da sich Ihre Einstellungen von denen des Eigentümer der Ressource unterscheiden.
Einstellungen zurücksetzen
Jagd durchs Labyrinth
ist eine Vorlage mit offenem Ende. Es generiert keine Punkte für eine Bestenliste.
Anmelden erforderlich
Visueller Stil
Schriftarten
Abonnement erforderlich
Einstellungen
Vorlage ändern
Alle anzeigen
Weitere Formate werden angezeigt, wenn du die Aktivität spielst.
Offene Ergebnisse
Link kopieren
QR-Code
Löschen
Soll die automatisch gespeicherte Aktivität
wiederhergestellt werden?