Search Header Logo

Network Security 2

Authored by Satinder Sohal

Computers, Professional Development

Professional Development

Used 12+ times

Network Security 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a computer software?

Random Access Memory

Apps

monitor

Core Processing Unit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are virtual ports used for?

Transfer Control Protocol

Plugging in one hardware to another

Internet connection

None of the above

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

When a communication packet comes into a computer what does it do?

Carries information about what port it wants to connect to

Tell the router what destination it needs.

Gets delivered to all devices on the same network.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What ports are the most frequently used by hackers? Tick all that apply.

22

80

443

465

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are all machines on the internet categorised into?

Servers and clients

Servers and DNS

Public and private networks

clients and machines

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you send a request to a server what is the port number connection?

80

20

443

22

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is a security software? Tick all that apply.

Firewall

Network Security

Internet of Things

Malware Protection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?