Search Header Logo
Networking mapelead

Networking mapelead

Assessment

Presentation

Information Technology (IT)

Vocational training

Practice Problem

Medium

Created by

Ayomide Oluwaga

Used 2+ times

FREE Resource

28 Slides • 36 Questions

1

media

2

Multiple Choice

What are the key components of networking fundamentals that are essential for cybersecurity?

1

Routers

2

Firewalls

3

Switches

4

All of the above

3

media

4

Multiple Choice

What is the primary function of networking as described in the introduction?

1

To connect devices and systems

2

To store data

3

To create software

4

To manage user accounts

5

Multiple Choice

A computer network can share printers and software.
1
True
2
False

6

media

7

Multiple Choice

What is the purpose of subnetting as described in the text?

1

To increase internet speed

2

To divide a large network into smaller sections

3

To assign MAC addresses

4

To manage ports and protocols

8

Multiple Choice

The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?
1
IPv6 will allow problems with IPv4's address hierarchy to be resolved
2
32-bit addresses could not ensure that every internet-connected device can receive a unique IP address
3
32-bit addresses could not accommodate the increased size and amount of data traveling on the Internet as it has grown in popularity
4
IPv4 proved unreliable in some cases where network redundancy could not be ensured

9

media

10

Multiple Choice

How many total number of hosts available in the Class C network?

1

65536

2

128

3

127

4

256

11

Multiple Choice

which one of the following is a Class D ip address?

1

237.0.0.8

2

240.0.0.5

3

10.0.0.5

4

171.0.0.10

12

Multiple Choice

What is the most frequently used communications protocol?

1

IPv4

2

IPv6

3

IPv8

4

IPv10

13

Multiple Choice

How many classes of IP addresses are there?

1

2

2

3

3

4

4

5

14

Multiple Choice

Which class of network addresses is used by government, ISPs and large universities.

1

Class A

2

Class B

3

Class C

4

Class D

15

media

16

Multiple Choice

What is a Wide Area Network (WAN)?

1

A network that covers a larger geographic area than a LAN

2

A network limited to a small geographic area

3

A network connecting several campuses within a city

4

A network that spans a larger geographical area

17

media

18

Multiple Choice

Question image

What is a major advantage of using a LAN?

1

Easy global connectivity

2

Large geographical coverage

3

High data transfer speed at low cost

4

Requires no setup

19

media

20

media

21

Multiple Choice

How does a switch differ from a hub in a network?

1

A switch broadcasts data to all connected devices creating a single collision domain.

2

A hub forwards data based on MAC addresses and creates separate collision domains.

3

A switch and a hub both create separate collision domains in a network.

4

A switch forwards data based on MAC addresses and creates separate collision domains, while a hub broadcasts data to all connected devices creating a single collision domain.

22

media

23

Multiple Choice

What are the characteristics of a Stateless/Packet Filtering Firewall?

1

Stateless, efficient, limited complexity

2

Stateful, context-aware

3

Monitors active connections

4

Allows all traffic

24

media

25

Multiple Choice

Which of the following best describes the function of a Next-Generation Firewall (NGFW)?

1

It filters traffic based on state, port, and protocol.

2

It enhances security by integrating intrusion prevention, deep packet inspection, and application awareness.

3

It primarily focuses on filtering traffic based on IP addresses and ports.

4

It is designed to protect against physical intrusions into the network.

26

media

27

Multiple Select

Question image

Which of the following are downsides of a bus topology (select all that apply)?

1

If two (or more) devices try to transmit at the same time, it will cause a collision.

2

Every device attached to the bus can "read" every message.

3

A failure of the main bus cable will bring the whole network to a stop.

4

If there is a failure in the cable that connects a single device to the bus, it will affect just that device.

28

media

29

Multiple Choice

What is the purpose of a port number in networking?

1

To identify a specific process

2

To connect devices

3

To secure data transmission

4

To manage network traffic

30

media

31

Match

Match the following port names with their range:

Well-Known

Registered

Dynamic, Private, or Ephemeral Ports

0-1023

1024-49151

49151-63565

32

Dropdown

HTTP and HTTPs: These are ​
used for transferring web pages. ​
is a ​
of HTTP commonly used for online transactions.

33

Match

Match the following ports to their numbers: DNS, HTTPS, IMAP, TELNET

DNS

HTTPS

IMAP

TELNET

53
443
143
23

34

media

35

Multiple Choice

Question image

Imagine Aria and David have set up a small office network. What is the primary function of a firewall they installed to protect their network?

1

To increase internet speed.

2

To serve as a physical barrier against network intrusion.

3

To monitor and control incoming and outgoing network traffic based on predetermined security rules.

4

To detect and remove viruses and other malware.

36

Multiple Choice

What is the purpose of network segmentation in security?

1

To increase network speed

2

To limit the impact of breaches

3

To simplify network management

4

To eliminate all security risks

37

media

38

Multiple Choice

What are security protocols designed to ensure?

1

Secure transmission of data

2

Data storage

3

Data analysis

4

Data visualization

39

media

40

Multiple Choice

What is the purpose of SSL/TLS in security protocols?

1

Encrypts data during transmission

2

Provides security at the IP layer

3

Secures email communication

4

Authenticates users

41

media

42

Multiple Choice

Question image

I sit between the internet and the network. I protect the network, by blocking viruses, malware and worms. I can be both hardware and software

1

Router

2

Firewall

3

Ethernet Cable

4

Modem

43

Multiple Choice

Which of the following best describes the purpose of a Virtual Private Network (VPN) in terms of network security?

1

To increase the speed of internet connections.

2

To provide a secure, encrypted connection over a less secure network, such as the internet.

3

To serve as the primary method for user authentication.

4

To monitor and log all internet traffic for review.

44

media

45

Multiple Choice

What does OSI stand for?

1

International Standards Organization

2

Open Systems Interconnect

3

Operating Standard Information

4

Operating System Interconnection

5

Open Systems Interface

46

Multiple Choice

What is layer 7 of the OSI model?

1

Application

2

Presentation

3

Session

4

Transport

47

Multiple Choice

What is layer 5 of the OSI model?

1

Presentation

2

Session

3

Transport

4

Network

48

Multiple Choice

What is layer 3 of the OSI model?

1

Transport

2

Network

3

Data Link

4

Physical

49

Multiple Choice

What is layer 4 of the OSI model?

1

Session

2

Transport

3

Network

4

Data Link

50

Multiple Choice

What are the main differences between the OSI model and the TCP/IP model?

1

The OSI model has 7 layers, while TCP/IP has 4 layers.

2

The OSI model is used for network security, while TCP/IP is not.

3

The OSI model is more widely used than TCP/IP.

51

media

52

Open Ended

Why is the OSI model important?

53

media

54

Multiple Choice

What is the purpose of transport protocols in data transmission?

1

To enhance data security

2

To improve data transmission speed

3

To manage network connections

4

To ensure data integrity

55

media

56

media

57

Multiple Choice

What are the key differences between TCP and UDP?

1

TCP is connection-oriented, while UDP is connectionless.

2

TCP is faster than UDP.

3

UDP ensures data integrity, while TCP does not.

4

TCP does not manage flow and congestion, while UDP does.

58

media

59

media

60

media

61

media

62

media

63

media

64

Poll

How confident do you feel about this topic now?

Very confident
Somewhat confident
Not confident
media

Show answer

Auto Play

Slide 1 / 64

SLIDE