Network Security

Network Security

University

20 Qs

quiz-placeholder

Similar activities

Quiz on List and Tuples

Quiz on List and Tuples

University

16 Qs

Data Structure & Algo - Prelim Long Quiz

Data Structure & Algo - Prelim Long Quiz

University

21 Qs

Introduction to Networking

Introduction to Networking

University

15 Qs

The AI Shield

The AI Shield

University

15 Qs

UAS PTIK D 2020 TOPIK KHUSUS MULTIMEDIA

UAS PTIK D 2020 TOPIK KHUSUS MULTIMEDIA

University

20 Qs

Data Mining - Classification Mining

Data Mining - Classification Mining

University

15 Qs

Quiz # 1 in Capstone Project and Research 1

Quiz # 1 in Capstone Project and Research 1

University

15 Qs

Unit 28 - Quiz #1

Unit 28 - Quiz #1

University

15 Qs

Network Security

Network Security

Assessment

Quiz

Computers

University

Hard

Created by

AZAH NORMAN

Used 706+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ refers to the network command for how to format the conversation between two devices.

Addressing

Protocol

Media

Domain

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The network equipment used for the transmission of data are simply specialized computers that are designed for the acceptance, storage, and __________ of data signals.

understanding

structuring

retransmission

reforming

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ are considered the “traffic cops” for the flow of information inside and outside of the network, and to accomplish this have signaling rules called “protocols” on what to do for network failure for the rerouting of traffic.

Routers

Hubs

Gateways

Switches

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The flow of traffic is from a user’s client computer, to a __________, to a __________, and then out to the Internet or to a local data center to access the services needed.

switch, router

router, gateway

router, switch

switch, hub

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The OSI and TCP/IP models structure the __________ used for signaling and the separation of function in a network.

addressing

media

domain

protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security professional’s interest in __________ lies in defining the points that allow access for investigation, interruption, and attacks

network structures

network devices

network traffics

network segmentation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The __________, known as “Layer 2,” contains the broad start and stop signaling used to alert the switches to the beginning and ending of a transmission of data.

physical layer

application layer

transport layer

network layer

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?