Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

quiz-placeholder

Similar activities

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Topic 8 Quiz: Internet and World Wide Web

Topic 8 Quiz: Internet and World Wide Web

University

17 Qs

Round1: QUIZ IT

Round1: QUIZ IT

University

15 Qs

IT01- MIDTERM

IT01- MIDTERM

University

20 Qs

Network Security

Network Security

University

10 Qs

1st round

1st round

University

20 Qs

LATIHAN SOAL AKHIR SEMESTER

LATIHAN SOAL AKHIR SEMESTER

University

15 Qs

CS VPN Quiz

CS VPN Quiz

University

15 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the four critical functions of VPN, what function is preventing the data to be read or copied as the data is being transported?

Confidentiality

Authentication

Data Integrity

Access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method of scrambling data

before transmitting it onto the Internet?

Confidentiality

Authentication

Encryption

Decryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WAN technology that adds security and anonymity to users when they connect to web-based services and sites and the user's actual public IP address and “tunnels” traffic between the user's device and the remote server?

LAN

VPN

BGP

IGRP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a protocol for transferring data securely from one network end-point to another?

Networking protocol

WAN protocol

Encryption protocol

Tunneling protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data-link layer protocol for WAN, developed by Microsoft that enables network traffic to be encapsulated and routed over an unsecured public network such as the Internet?

Point-to-Point Tunneling Protocol

Internet Protocol Security

Layer 2 Tunneling Protocol

Tunneling protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer networking protocol used by Internet service providers (ISPs) to enable virtual private network (VPN) operations?

Point-to-Point Tunneling Protocol

Internet Protocol Security

Layer 2 Tunneling Protocol

Tunneling protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a ____ port used for L2TP communication because it does not provide any security for data such as encryption and confidentiality, an encryption protocol such as the Internet.

HTTPS

HTTP

TCP

UDP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?