This type of network connects networks across a large geographical area such as a state or a country.
Wide Area Network
What is the interruption of network services to users, devices, or applications?
Denial of Service.
What language does this code belong to?
++++++++++[>+++++++>++++++++++>+++>+<<<<-]>++.>+.+++++++..+++.>++.
<<+++++++++++++++.>.+++.——.——–.>+.>.
Brainf*ck
Searching and sorting algorithms are best implemented with which data structure? (Name 1 of the 2)
An array-based list or linked list.
A freely available command line operating system, that provides multitasking and multi-user characteristics,.
Linux.
A private network that belongs to an organization and is designed to be accessible only by the organization’s members, employees, or others with authorization.
Intranet
What is it when attackers examine all network traffic as it passes through their NIC, independent of whether or not the traffic is addressed to them or not.
Sniffing.
What language does this code belong to?
HAI
CAN HAS STDIO?
I HAS A VAR
IM IN YR LOOP
UP VAR!!1
VISIBLE VAR
IZ VAR BIGGER THAN 10? KTHX
IM OUTTA YR LOOP
KTHXBYE
LOLCODE
Which search algorithm is best for a large list (sorted)?
Binary Search.
A command line operating system released in November 1971, when there were only about 60 commands. Has the ability to replace expensive mainframe systems and it was developed by Bell Labs by the same people who helped to create C programming language.
UNIX
More expensive than twisted pair and is used to transmit voice, video, and data. It is ideal for a medium-sized network and for cable TV.
Coaxial Cable
What is an impersonation attack, which takes advantage of a trusted relationship between two systems.
Spoofing.
What language does this code belong to?
chicken chicken chicken chicken chicken chicken chicken chicken chicken chicken chicken
chicken chicken chicken chicken chicken chicken
Chicken
A binary search algorithm can be best described as what type of algorithm.
A divide and conquer technique.
The first ever GUI operating system released in 1984 and is considered as the easiest operating system to use.
MAC OS.
These are radio waves that provide high-speed transmission of analog and digital signals. They are limited to line-of-sight
Microwave
What is called when you intercept communications between computers to steal information crossing the network?
Man in the Middle
What language does this code belong to?
Act I: Hamlet’s insults and flattery.
Scene I: The insulting of Romeo.
Shakespeare
On average, a sequential search algorithm would make how many comparisons for a list of size N.
N/2
A command line user interface that was developed by the Microsoft Corporation and released in August of 1981 for IBM computers.
MS-DOS (Microsoft Disk Operating system)
A protocol used to request and transmit files, especially Web pages and Web page components, over the internet or other computer network.
Hyper Text Transfer Protocol
What is a computer attack that tries to exploit software vulnerabilities that are unknown or undisclosed by the software vendor?
Zero Day
What language does this code belong to?
S S S T S S T S S S
T
S S S S S T T S S T S T
T
S S S S S T T S T T S S
T
S S S S S T T S T T S S
T
S S S S S T T S T T T T
T
S S S S S T S T T S S
T
S S S S S T S S S S S
T
Whitespace.
What is the faster sorting algorithm?
Quicksort.
Most commonly used OS system for hacking.
Kali Linux.