
Networking mapelead
Presentation
•
Information Technology (IT)
•
Vocational training
•
Practice Problem
•
Medium
Ayomide Oluwaga
Used 2+ times
FREE Resource
28 Slides • 36 Questions
1
2
Multiple Choice
What are the key components of networking fundamentals that are essential for cybersecurity?
Routers
Firewalls
Switches
All of the above
3
4
Multiple Choice
What is the primary function of networking as described in the introduction?
To connect devices and systems
To store data
To create software
To manage user accounts
5
Multiple Choice
6
7
Multiple Choice
What is the purpose of subnetting as described in the text?
To increase internet speed
To divide a large network into smaller sections
To assign MAC addresses
To manage ports and protocols
8
Multiple Choice
9
10
Multiple Choice
How many total number of hosts available in the Class C network?
65536
128
127
256
11
Multiple Choice
which one of the following is a Class D ip address?
237.0.0.8
240.0.0.5
10.0.0.5
171.0.0.10
12
Multiple Choice
What is the most frequently used communications protocol?
IPv4
IPv6
IPv8
IPv10
13
Multiple Choice
How many classes of IP addresses are there?
2
3
4
5
14
Multiple Choice
Which class of network addresses is used by government, ISPs and large universities.
Class A
Class B
Class C
Class D
15
16
Multiple Choice
What is a Wide Area Network (WAN)?
A network that covers a larger geographic area than a LAN
A network limited to a small geographic area
A network connecting several campuses within a city
A network that spans a larger geographical area
17
18
Multiple Choice
What is a major advantage of using a LAN?
Easy global connectivity
Large geographical coverage
High data transfer speed at low cost
Requires no setup
19
20
21
Multiple Choice
How does a switch differ from a hub in a network?
A switch broadcasts data to all connected devices creating a single collision domain.
A hub forwards data based on MAC addresses and creates separate collision domains.
A switch and a hub both create separate collision domains in a network.
A switch forwards data based on MAC addresses and creates separate collision domains, while a hub broadcasts data to all connected devices creating a single collision domain.
22
23
Multiple Choice
What are the characteristics of a Stateless/Packet Filtering Firewall?
Stateless, efficient, limited complexity
Stateful, context-aware
Monitors active connections
Allows all traffic
24
25
Multiple Choice
Which of the following best describes the function of a Next-Generation Firewall (NGFW)?
It filters traffic based on state, port, and protocol.
It enhances security by integrating intrusion prevention, deep packet inspection, and application awareness.
It primarily focuses on filtering traffic based on IP addresses and ports.
It is designed to protect against physical intrusions into the network.
26
27
Multiple Select
Which of the following are downsides of a bus topology (select all that apply)?
If two (or more) devices try to transmit at the same time, it will cause a collision.
Every device attached to the bus can "read" every message.
A failure of the main bus cable will bring the whole network to a stop.
If there is a failure in the cable that connects a single device to the bus, it will affect just that device.
28
29
Multiple Choice
What is the purpose of a port number in networking?
To identify a specific process
To connect devices
To secure data transmission
To manage network traffic
30
31
Match
Match the following port names with their range:
Well-Known
Registered
Dynamic, Private, or Ephemeral Ports
0-1023
1024-49151
49151-63565
0-1023
1024-49151
49151-63565
32
Dropdown
33
Match
Match the following ports to their numbers: DNS, HTTPS, IMAP, TELNET
DNS
HTTPS
IMAP
TELNET
34
35
Multiple Choice
Imagine Aria and David have set up a small office network. What is the primary function of a firewall they installed to protect their network?
To increase internet speed.
To serve as a physical barrier against network intrusion.
To monitor and control incoming and outgoing network traffic based on predetermined security rules.
To detect and remove viruses and other malware.
36
Multiple Choice
What is the purpose of network segmentation in security?
To increase network speed
To limit the impact of breaches
To simplify network management
To eliminate all security risks
37
38
Multiple Choice
What are security protocols designed to ensure?
Secure transmission of data
Data storage
Data analysis
Data visualization
39
40
Multiple Choice
What is the purpose of SSL/TLS in security protocols?
Encrypts data during transmission
Provides security at the IP layer
Secures email communication
Authenticates users
41
42
Multiple Choice
I sit between the internet and the network. I protect the network, by blocking viruses, malware and worms. I can be both hardware and software
Router
Firewall
Ethernet Cable
Modem
43
Multiple Choice
Which of the following best describes the purpose of a Virtual Private Network (VPN) in terms of network security?
To increase the speed of internet connections.
To provide a secure, encrypted connection over a less secure network, such as the internet.
To serve as the primary method for user authentication.
To monitor and log all internet traffic for review.
44
45
Multiple Choice
What does OSI stand for?
International Standards Organization
Open Systems Interconnect
Operating Standard Information
Operating System Interconnection
Open Systems Interface
46
Multiple Choice
What is layer 7 of the OSI model?
Application
Presentation
Session
Transport
47
Multiple Choice
What is layer 5 of the OSI model?
Presentation
Session
Transport
Network
48
Multiple Choice
What is layer 3 of the OSI model?
Transport
Network
Data Link
Physical
49
Multiple Choice
What is layer 4 of the OSI model?
Session
Transport
Network
Data Link
50
Multiple Choice
What are the main differences between the OSI model and the TCP/IP model?
The OSI model has 7 layers, while TCP/IP has 4 layers.
The OSI model is used for network security, while TCP/IP is not.
The OSI model is more widely used than TCP/IP.
51
52
Open Ended
Why is the OSI model important?
53
54
Multiple Choice
What is the purpose of transport protocols in data transmission?
To enhance data security
To improve data transmission speed
To manage network connections
To ensure data integrity
55
56
57
Multiple Choice
What are the key differences between TCP and UDP?
TCP is connection-oriented, while UDP is connectionless.
TCP is faster than UDP.
UDP ensures data integrity, while TCP does not.
TCP does not manage flow and congestion, while UDP does.
58
59
60
61
62
63
64
Poll
How confident do you feel about this topic now?
Show answer
Auto Play
Slide 1 / 64
SLIDE
Similar Resources on Wayground
58 questions
WORD FORMATION: ADJECTIVES AND NOUNS
Presentation
•
Professional Development
60 questions
Quizizz AI to Enhance Student Engagement: (HS) United ISD
Presentation
•
Professional Development
58 questions
Social, environmental & ethical considerations
Presentation
•
Professional Development
52 questions
português - Termos da oração
Presentation
•
KG
60 questions
Present simple & continuous review + questions Lesson B
Presentation
•
Professional Development
56 questions
สรุปบทเรียนการแทรกสอดและการเลี้ยวเบนของแสง
Presentation
•
KG
59 questions
Redes sociales
Presentation
•
KG
58 questions
Regencia 2nd term quiz short
Presentation
•
KG
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade