
Network Security Chapter 4 Quiz
Authored by Mashy Ishak
Computers

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a virtual private network (VPN)?
To scan networks to determine everything that is connected
To fake the sending address of a transmission to gain illegal entry into a secure system
To manage and control the underlying cloud infrastructure
To provide a secure communications mechanism for transmission between networks
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which model specifies four layers of functionality: Link layer, Internet Layer, Transport Layer, and Application Layer?
Ethernet model
Wi-Fi model
TCP/IP model
OSI model
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary action of a malicious code attack known as?
Payload
Encryption
De-encapsulation
Broadcast
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the acronym for the standard communication protocol for sending and receiving emails between senders and receivers?
ICMP
FTP
SMTP
API
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process and act of converting the message from its plaintext to ciphertext?
Broadcast
Denial-of-Service
Encryption
Encapsulation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the opposite process of encapsulation, in which bundles of data are unpacked or revealed?
Encryption
De-encapsulation
Payload
Broadcast
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the acronym for the internet protocol used to determine if a particular service or host is available?
API
SMTP
FTP
ICMP
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?