Security 101 - 2nd Week

Security 101 - 2nd Week

Professional Development

10 Qs

quiz-placeholder

Similar activities

Know your device (with FOPM Objectives)

Know your device (with FOPM Objectives)

Professional Development

11 Qs

Gordon's Review: Mod 1 Intro to Cybersecurity

Gordon's Review: Mod 1 Intro to Cybersecurity

Professional Development

10 Qs

ITF - Quiz 10.1 - Internet Service Types

ITF - Quiz 10.1 - Internet Service Types

Professional Development

12 Qs

Explore 2022 - NSX-T 3.2 ATP

Explore 2022 - NSX-T 3.2 ATP

Professional Development

13 Qs

Attack Vectors

Attack Vectors

Professional Development

10 Qs

1.5 WIRED AND WIRELESS NETWORKS

1.5 WIRED AND WIRELESS NETWORKS

9th Grade - Professional Development

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Networking Types: Wireless and Wired

Networking Types: Wireless and Wired

9th Grade - Professional Development

10 Qs

Security 101 - 2nd Week

Security 101 - 2nd Week

Assessment

Quiz

Computers

Professional Development

Easy

Created by

A Moreno

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which best describes a router?

A device that connects to other devices

A service that utilizes a specific protocol

A device that connects you to other networks

A service that uses the OSI model

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a switch do?

Uses Client / Server mode of communication

Connects you to devices within a WAN

Alternates Network Currents

Connects you to devices within a LAN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which of these are not an endpoint?

Laptop

Printer

Cell Phone

Power Outlet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these services secure shell?

443

22

25

80

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is network encapsulation?

The method of wrapping the entire network infrastructure in a protective layer to prevent unauthorized access.

The process of adding protocol headers and trailers to data packets as they traverse different network layers.

The process of compressing network traffic to reduce bandwidth consumption.

The technique used to encrypt data transmitted over a network to ensure confidentiality.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these ports provide TLS over HTTP?

8080

443

25

53

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the behavior of a stateful firewall?

Monitors incoming traffic

Performs ongoing monitoring of active connects

Prohibits unwanted traffic

Performs IP, Port analysis

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?