Search Header Logo

Networks and Security: Quiz 6

Authored by John Coder

Computers

Professional Development

Used 1+ times

Networks and Security: Quiz 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A set of rules used by two or more devices on a network to describe the order of delivery and structure of the data.

ne???? pr??????

(a)  

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

? protocols govern the exchange of information in network transmission. They dictate how the data is transmitted between devices and the timing. They also include methods to recover data lost in transit.

communications

transmission control

user datagram

hypertext transfer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

? is a connectionless protocol that does not establish a connection between devices before a transmission. This makes it less reliable than TCP. But it also means that it works well for transmissions that need to get to their destination quickly. For example, one use of UDP is for internet gaming transmissions. ? protocol occurs at the transport layer.

communications

transmission control

user datagram

hypertext transfer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

? is an application layer protocol that provides a method of communication between clients and website servers. ? uses port 80. ? is considered insecure, so it is being replaced on most websites by a another version. However, there are still many websites that use the insecure ? protocol. In the TCP/IP model, ? occurs at the application layer.

communications

transmission control

user datagram

hypertext transfer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

? is an internet communication protocol that allows two devices to form a connection and stream data. It uses a three-way handshake process. First, the device sends a synchronize (SYN) request to a server. Then the server responds with a SYN/ACK packet to acknowledge receipt of the device's request. Once the server receives the final ACK packet from the device, a connection is established.

communications

transmission control

user datagram

hypertext transfer

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A network protocol that provides a secure method of communication between clients and website servers.

HTTPS

(a)  

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An internet communications protocol that allows two devices to from a connection and stream data.

TCP

(a)  

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?