Networks and Security: Quiz 7

Networks and Security: Quiz 7

Professional Development

15 Qs

quiz-placeholder

Similar activities

CCNA Final Assessment

CCNA Final Assessment

Professional Development

20 Qs

BCS Systems & Architecture Quiz 1

BCS Systems & Architecture Quiz 1

University - Professional Development

20 Qs

Teknik Analisa Protokol dan Traffic

Teknik Analisa Protokol dan Traffic

Professional Development

20 Qs

Exercício de Casa

Exercício de Casa

Professional Development

10 Qs

ENCOR-401-PreAssessment

ENCOR-401-PreAssessment

Professional Development

15 Qs

administrasi insfrastruktur jaringan

administrasi insfrastruktur jaringan

Professional Development

10 Qs

Cyber 2 Module 5

Cyber 2 Module 5

9th Grade - Professional Development

20 Qs

BCS Network Security Test 7

BCS Network Security Test 7

University - Professional Development

20 Qs

Networks and Security: Quiz 7

Networks and Security: Quiz 7

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

John Coder

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The next category of network protocols is management protocols. Management protocols are used for monitoring and managing activity on a network. They include protocols for e_____ reporting and op___________ performance on the network.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

sim_______ net_______ man_______ protocol (SNMP) is a network protocol used for monitoring and managing devices on a network. SNMP can reset a password on a network device or change its baseline configuration. It can also send requests to network devices for a report on how much of the network’s bandwidth is being used up. In the TCP/IP model, SNMP occurs at the application layer.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

int_______ con_______ mes_______ protocol (ICMP) is an internet protocol used by devices to tell each other about data transmission errors across the network. ICMP is used by a receiving device to send a report to the sending device about the data transmission. ICMP is commonly used as a quick way to troubleshoot network connectivity and latency by issuing the “ping” command on a Linux operating system. In the TCP/IP model, ICMP occurs at the internet layer.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Security protocols are network protocols that ensure that data is sent and received securely across a network. Security protocols use en_______ algorithms to protect data in transit.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

HTTPS is a network protocol that provides a secure method of communication between clients and website servers. HTTPS is a secure version of HTTP that uses se__________ so__________ la__________/transport la__________ security (SSL/TLS) encryption on all transmissions so that malicious actors cannot read the information contained. HTTPS uses port 44?. In the TCP/IP model, HTTPS occurs at the ? layer.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Secure File Transfer Protocol (SFTP) is a secure protocol used to transfer files from one device to another over a network. SFTP uses se_____ sh_____ (SSH), typically through TCP port 22. SSH uses Advanced Encryption Standard (AES) and other types of encryption to ensure that unintended recipients cannot intercept the transmissions. In the TCP/IP model, SFTP occurs at the ? layer. SFTP is used often with cl________ storage. Every time a user uploads or downloads a file from cl________ storage, the file is transferred using the SFTP protocol.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

The devices on your local home or office network each have a private IP address that they use to communicate directly with each other. In order for the devices with private IP addresses to communicate with the public internet, they need to have a public IP address. Otherwise, responses will not be routed correctly. Instead of having a dedicated public IP address for each of the devices on the local network, the router can replace a private source IP address with its public IP address and perform the reverse operation for responses. This process is known as net____ add____ tran_____ and it generally requires a router or firewall to be specifically configured to perform NAT. NAT is a part of layer 2 internet layer and layer 3 (transport layer) of the TCP/IP model.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?