ICT169 - Friday

ICT169 - Friday

University

19 Qs

quiz-placeholder

Similar activities

crypto first round

crypto first round

University

20 Qs

Direccionamiento IPv4

Direccionamiento IPv4

University

15 Qs

Cyber Crime

Cyber Crime

University

20 Qs

BCS Systems & Architecture Quiz 4

BCS Systems & Architecture Quiz 4

University - Professional Development

24 Qs

TOPIC 1 COMPUTER HARDWARE

TOPIC 1 COMPUTER HARDWARE

University

19 Qs

CySA+ Day 9

CySA+ Day 9

University

20 Qs

Tutorial 8 Security

Tutorial 8 Security

University

15 Qs

Networking Protocols Quiz Topic C02

Networking Protocols Quiz Topic C02

University

15 Qs

ICT169 - Friday

ICT169 - Friday

Assessment

Quiz

Instructional Technology

University

Hard

Created by

Shaun Matthews

Used 1+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which protocol uses encryption?

HTTPS

FTP

DNS

DHCP

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which statement is true about FTP?

The client can decide if FTP is going to establish one or two connections to the server

FTP is a peer to peer protocol

The client can download or upload data to the server

FTP does not provide reliability during data transmission

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What is the purpose of using a source port number in a TCP communication?

to notify the remote device that the conversation is over

to keep track of multiple conversation between devices

to inquire for a non received segment

to assemble the segments that received out of order

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What type of applications are best suited for using UDP?

applications that require retransmission of lost segments

applications that are sensitive to delay

applications that need reliable delivery

applications that are sensitive to packet loss

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which command can be used on a Windows host to display the routing table?

netstat -s

show ip route

netstat -r

tracert

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?

destination MAC address

source MAC address

source IP address

destination IP address

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which subnet mask would be used if 5 host bits are available?

255.255.255.128

255.255.255.224

255.255.255.240

255.255.255.0

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?