
Network Security 2
Authored by Satinder Sohal
Computers, Professional Development
Professional Development
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a computer software?
Random Access Memory
Apps
monitor
Core Processing Unit
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are virtual ports used for?
Transfer Control Protocol
Plugging in one hardware to another
Internet connection
None of the above
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
When a communication packet comes into a computer what does it do?
Carries information about what port it wants to connect to
Tell the router what destination it needs.
Gets delivered to all devices on the same network.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What ports are the most frequently used by hackers? Tick all that apply.
22
80
443
465
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are all machines on the internet categorised into?
Servers and clients
Servers and DNS
Public and private networks
clients and machines
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When you send a request to a server what is the port number connection?
80
20
443
22
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What is a security software? Tick all that apply.
Firewall
Network Security
Internet of Things
Malware Protection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?