The Worst IT Quiz Ever

The Worst IT Quiz Ever

Professional Development

15 Qs

quiz-placeholder

Similar activities

Quizziz OZEOL 2.0

Quizziz OZEOL 2.0

Professional Development

10 Qs

Jeffy

Jeffy

KG - Professional Development

10 Qs

Fire Briefing Consumer "I'm the Best Sales Force"

Fire Briefing Consumer "I'm the Best Sales Force"

Professional Development

15 Qs

Guess The Cartoon

Guess The Cartoon

Professional Development

15 Qs

Friends Trivia Game Night: Where

Friends Trivia Game Night: Where

5th Grade - Professional Development

10 Qs

Subnetting Repaso

Subnetting Repaso

Professional Development

10 Qs

Project mc²

Project mc²

2nd Grade - Professional Development

11 Qs

The Worst IT Quiz Ever

The Worst IT Quiz Ever

Assessment

Quiz

Fun, Computers, Education

Professional Development

Hard

Created by

Kevin Johnson

Used 49+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the command used for

searching plain-text data within

a file in Linux/Unix?

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two statements about cryptographic file transfer are true?

FTPS uses SSH at port 22

SFTP and SCP have identical properties and operate on the same port

SFTP does not negotiate using digital certificates

FTPS uses explicit & implicit methods to invoke client security

UDP ports 989 and 990 are used for FTPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your wireless access point operates

at the network layer of the OSI layer model.

at the data link layer of the OSI layer model.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are not used in copper cabling?

BNC

QSFP

RJ-45

MT-RJ

F-Connector

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not true regarding the Frame Check Sequence field in an Ethernet frame?

This field is 32 bits long.

It contains a mechanism to check the frame's overall integrity.

Contains only the Destination Address if the host is in receiver's ARP table.

Is located at the end of the frame.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital Certificates ensure confidentiality, non-repudiation and integrity.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which are true of RC4?

It uses an asymmetric algorithm.

Vulnerabilities with RC4 causes WEP to be insecure.

Was designed by one author of the RSA algorithm and defeated by another.

All of the above.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?