ICT169 - Friday

ICT169 - Friday

University

19 Qs

quiz-placeholder

Similar activities

TA MODUL 7

TA MODUL 7

University

15 Qs

Networking Concepts Quiz

Networking Concepts Quiz

University

15 Qs

OSI Model

OSI Model

University

15 Qs

ICT 9 Q4 M1 & 2

ICT 9 Q4 M1 & 2

9th Grade - University

20 Qs

CYBER ADDA

CYBER ADDA

University

15 Qs

CCNA - SRWE - 7.4.4

CCNA - SRWE - 7.4.4

University

15 Qs

Module 14 Quiz

Module 14 Quiz

University

20 Qs

BCS Network Security Test 4

BCS Network Security Test 4

University

18 Qs

ICT169 - Friday

ICT169 - Friday

Assessment

Quiz

Created by

Shaun Matthews

Instructional Technology

University

1 plays

Hard

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which protocol uses encryption?

HTTPS

FTP

DNS

DHCP

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which statement is true about FTP?

The client can decide if FTP is going to establish one or two connections to the server

FTP is a peer to peer protocol

The client can download or upload data to the server

FTP does not provide reliability during data transmission

3.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What is the purpose of using a source port number in a TCP communication?

to notify the remote device that the conversation is over

to keep track of multiple conversation between devices

to inquire for a non received segment

to assemble the segments that received out of order

4.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What type of applications are best suited for using UDP?

applications that require retransmission of lost segments

applications that are sensitive to delay

applications that need reliable delivery

applications that are sensitive to packet loss

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which command can be used on a Windows host to display the routing table?

netstat -s

show ip route

netstat -r

tracert

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?

destination MAC address

source MAC address

source IP address

destination IP address

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which subnet mask would be used if 5 host bits are available?

255.255.255.128

255.255.255.224

255.255.255.240

255.255.255.0

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?