COMPUETR AND NETWORK

COMPUETR AND NETWORK

9th - 12th Grade

11 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

Network Security Basics

Network Security Basics

10th Grade

15 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

Identifying and Preventing Vulnerabilities

Identifying and Preventing Vulnerabilities

10th Grade

15 Qs

Security Systems - Threats

Security Systems - Threats

10th Grade

14 Qs

Protecting Data and Information Quiz

Protecting Data and Information Quiz

12th Grade

10 Qs

Cyber System Hardening Quiz

Cyber System Hardening Quiz

11th Grade

12 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

COMPUETR AND NETWORK

COMPUETR AND NETWORK

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Hussein Shatnawi

Used 6+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Media Access Control referred to physical address, is a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.

MAC Address

IP Address

DNS

DHCP

2.

MULTIPLE SELECT QUESTION

2 mins • 3 pts

Network components are :

ROUTER

PC

CAT 6

CABLE

SWITCH

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

DNS is stands for :

Domain Name System

Data network server

Dynamic Host configuration protocol

Direct name server

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

fiber optic cables is faster than CAT 6 cables in Data transmission

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The connection of two computers or more to transmit data between them or share resources is a :

computer hardware

computer software

computer

network

internet

protocol

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information -- such as credit card numbers, bank information, or passwords -- on websites that pretend to be legitimate. Cybercriminals typically pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to a phishing website.

Phishing

Spyware

Ransomware

Virus

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.

Antivirus software

Firewall

software

Passwords

Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?