The Worst IT Quiz Ever

The Worst IT Quiz Ever

Professional Development

15 Qs

quiz-placeholder

Similar activities

OSI Model - Data Link Layer

OSI Model - Data Link Layer

9th Grade - Professional Development

10 Qs

UT5 - ARP - DNS - DHCP

UT5 - ARP - DNS - DHCP

Professional Development

18 Qs

Ip Add and Subnetting

Ip Add and Subnetting

Professional Development

20 Qs

Subnetting

Subnetting

10th Grade - Professional Development

15 Qs

Subnetworks

Subnetworks

10th Grade - Professional Development

15 Qs

Part 5.5

Part 5.5

Professional Development

15 Qs

Sec+ CH.1 Review Test

Sec+ CH.1 Review Test

Professional Development

15 Qs

Advanced CyberCamp Day 1 & 2 Review

Advanced CyberCamp Day 1 & 2 Review

KG - Professional Development

20 Qs

The Worst IT Quiz Ever

The Worst IT Quiz Ever

Assessment

Quiz

Fun, Computers, Education

Professional Development

Hard

Created by

Kevin Johnson

Used 48+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the command used for

searching plain-text data within

a file in Linux/Unix?

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two statements about cryptographic file transfer are true?

FTPS uses SSH at port 22

SFTP and SCP have identical properties and operate on the same port

SFTP does not negotiate using digital certificates

FTPS uses explicit & implicit methods to invoke client security

UDP ports 989 and 990 are used for FTPS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your wireless access point operates

at the network layer of the OSI layer model.

at the data link layer of the OSI layer model.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of these are not used in copper cabling?

BNC

QSFP

RJ-45

MT-RJ

F-Connector

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not true regarding the Frame Check Sequence field in an Ethernet frame?

This field is 32 bits long.

It contains a mechanism to check the frame's overall integrity.

Contains only the Destination Address if the host is in receiver's ARP table.

Is located at the end of the frame.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital Certificates ensure confidentiality, non-repudiation and integrity.

True

False

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which are true of RC4?

It uses an asymmetric algorithm.

Vulnerabilities with RC4 causes WEP to be insecure.

Was designed by one author of the RSA algorithm and defeated by another.

All of the above.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?