Computer Networking Review - Mod 1-5

Computer Networking Review - Mod 1-5

Professional Development

10 Qs

quiz-placeholder

Similar activities

Fundamental Connectivity for AM online Class

Fundamental Connectivity for AM online Class

University - Professional Development

15 Qs

Day 9 Quiz

Day 9 Quiz

Professional Development

10 Qs

CCNAv2 Post-Assessment

CCNAv2 Post-Assessment

Professional Development

15 Qs

Fixed Data Core Assestment Exam

Fixed Data Core Assestment Exam

Professional Development

10 Qs

LAB NOC SIMULASI EXAM

LAB NOC SIMULASI EXAM

Professional Development

10 Qs

Zdalne zarządzanie, Zasady grup, Routing​ ​

Zdalne zarządzanie, Zasady grup, Routing​ ​

KG - Professional Development

12 Qs

ITF - Quiz 9.4 - Packet Delivery and Forwarding

ITF - Quiz 9.4 - Packet Delivery and Forwarding

Professional Development

15 Qs

Quiz_iDigisys- VPC

Quiz_iDigisys- VPC

Professional Development

10 Qs

Computer Networking Review - Mod 1-5

Computer Networking Review - Mod 1-5

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Christopher Hickernell

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many devices are required to create a network?

0

1

2

3

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network type is used to connect networks across a geographic area?

LAN

WAN

MAN

SAN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

UDP is a connection-oriented protocol that provides confirmed delivery of packets.

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Switches operate at with OSI Layer?

Physical

Data Link

Network

Transport

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software is required to connect to the console of a switch/router?

Wireshark

Packet Tracer

Duplex

Terminal Emulation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to enter Global Configuration mode?

conf t

line con 0

enable

write mem

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which attack does the attacker aim to flood the switch with a large number of fake addresses?

CAM Table Overlow

PING of death

MAC Spoofing

VLAN Hopping

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?