
Networks and Security: Quiz 6
Authored by John Coder
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A set of rules used by two or more devices on a network to describe the order of delivery and structure of the data.
ne???? pr??????
(a)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
? protocols govern the exchange of information in network transmission. They dictate how the data is transmitted between devices and the timing. They also include methods to recover data lost in transit.
communications
transmission control
user datagram
hypertext transfer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
? is a connectionless protocol that does not establish a connection between devices before a transmission. This makes it less reliable than TCP. But it also means that it works well for transmissions that need to get to their destination quickly. For example, one use of UDP is for internet gaming transmissions. ? protocol occurs at the transport layer.
communications
transmission control
user datagram
hypertext transfer
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
? is an application layer protocol that provides a method of communication between clients and website servers. ? uses port 80. ? is considered insecure, so it is being replaced on most websites by a another version. However, there are still many websites that use the insecure ? protocol. In the TCP/IP model, ? occurs at the application layer.
communications
transmission control
user datagram
hypertext transfer
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
? is an internet communication protocol that allows two devices to form a connection and stream data. It uses a three-way handshake process. First, the device sends a synchronize (SYN) request to a server. Then the server responds with a SYN/ACK packet to acknowledge receipt of the device's request. Once the server receives the final ACK packet from the device, a connection is established.
communications
transmission control
user datagram
hypertext transfer
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A network protocol that provides a secure method of communication between clients and website servers.
HTTPS
(a)
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
An internet communications protocol that allows two devices to from a connection and stream data.
TCP
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?