Search Header Logo

Network Security BSIT 3A

Authored by Andre Robles

Computers

University

Used 2+ times

Network Security BSIT 3A
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What do we call of an agreed-upon method of communication?

Protocol

Law

Mutual Understand

Rules

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What protocol is used for transferring files between computers but it is less-reliable form of file transfer?

Bluetooth

Trivial File Transfer Protocol

Tethering

File Transfer Protocol

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What communication port number is used in sending emails?

12

15

20

25

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

This is used to translate URLs into Web addresses.

ANSI

DNS

HTTP

ICMP

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

In networking, it is a connection point where there is a particular designation for a pathway of communications.

MAC Address

IP Address

Ports

Sockets

6.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

It is a command that queries a target IP address for information.

WhatsUp

ComIP

IPAdd

WhoIs

7.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

What Windows command prompt command that gives you some information about your connection to a network (or to the Internet)?

IP Config

IPConfig

IFConfig

IF Config

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers