Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

quiz-placeholder

Similar activities

Network Security

Network Security

University

20 Qs

Netw2-Quiz No. 3 (final term)

Netw2-Quiz No. 3 (final term)

University

18 Qs

Quiz on Basics of Computer Security and SSH

Quiz on Basics of Computer Security and SSH

University

12 Qs

UTS ADMINISTRASI SISTEM JARINGAN

UTS ADMINISTRASI SISTEM JARINGAN

12th Grade - University

15 Qs

CT Week 4 Computer Networking

CT Week 4 Computer Networking

University

16 Qs

Week 12 - Module 5 Unit 3 Using Access Control

Week 12 - Module 5 Unit 3 Using Access Control

University

20 Qs

Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

University

15 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the four critical functions of VPN, what function is preventing the data to be read or copied as the data is being transported?

Confidentiality

Authentication

Data Integrity

Access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method of scrambling data

before transmitting it onto the Internet?

Confidentiality

Authentication

Encryption

Decryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WAN technology that adds security and anonymity to users when they connect to web-based services and sites and the user's actual public IP address and “tunnels” traffic between the user's device and the remote server?

LAN

VPN

BGP

IGRP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a protocol for transferring data securely from one network end-point to another?

Networking protocol

WAN protocol

Encryption protocol

Tunneling protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data-link layer protocol for WAN, developed by Microsoft that enables network traffic to be encapsulated and routed over an unsecured public network such as the Internet?

Point-to-Point Tunneling Protocol

Internet Protocol Security

Layer 2 Tunneling Protocol

Tunneling protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer networking protocol used by Internet service providers (ISPs) to enable virtual private network (VPN) operations?

Point-to-Point Tunneling Protocol

Internet Protocol Security

Layer 2 Tunneling Protocol

Tunneling protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a ____ port used for L2TP communication because it does not provide any security for data such as encryption and confidentiality, an encryption protocol such as the Internet.

HTTPS

HTTP

TCP

UDP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?