Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

quiz-placeholder

Similar activities

Internet_Intranet_Extranet

Internet_Intranet_Extranet

University

10 Qs

Email Lớp 6

Email Lớp 6

6th Grade - University

17 Qs

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

6th Grade - Professional Development

10 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

CLOUD COMPUTING: ACTIVITY 3

CLOUD COMPUTING: ACTIVITY 3

University

10 Qs

Gli indirizzi IP

Gli indirizzi IP

9th Grade - Professional Development

15 Qs

Networking 101

Networking 101

University

13 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the four critical functions of VPN, what function is preventing the data to be read or copied as the data is being transported?

Confidentiality

Authentication

Data Integrity

Access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method of scrambling data

before transmitting it onto the Internet?

Confidentiality

Authentication

Encryption

Decryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WAN technology that adds security and anonymity to users when they connect to web-based services and sites and the user's actual public IP address and “tunnels” traffic between the user's device and the remote server?

LAN

VPN

BGP

IGRP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a protocol for transferring data securely from one network end-point to another?

Networking protocol

WAN protocol

Encryption protocol

Tunneling protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data-link layer protocol for WAN, developed by Microsoft that enables network traffic to be encapsulated and routed over an unsecured public network such as the Internet?

Point-to-Point Tunneling Protocol

Internet Protocol Security

Layer 2 Tunneling Protocol

Tunneling protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer networking protocol used by Internet service providers (ISPs) to enable virtual private network (VPN) operations?

Point-to-Point Tunneling Protocol

Internet Protocol Security

Layer 2 Tunneling Protocol

Tunneling protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a ____ port used for L2TP communication because it does not provide any security for data such as encryption and confidentiality, an encryption protocol such as the Internet.

HTTPS

HTTP

TCP

UDP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?