Computer Networks Mastery Quiz

Computer Networks Mastery Quiz

12th Grade

15 Qs

quiz-placeholder

Similar activities

User Interface Design - Topic 1

User Interface Design - Topic 1

12th Grade

15 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

Database concepts

Database concepts

12th Grade

16 Qs

Quiz #2 ETEC 486 | Spr. 16

Quiz #2 ETEC 486 | Spr. 16

KG - University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

QUIZ 2

QUIZ 2

University

20 Qs

Review Quiz (Chapter 3&4)

Review Quiz (Chapter 3&4)

University

20 Qs

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

Computer Networks Mastery Quiz

Computer Networks Mastery Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

B McCue

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine Benjamin, Freya, and Isabella are playing a game of 'Network Topology Trivia'. Benjamin asks, 'Which topology requires a central device for all communications?' Can you help Freya and Isabella answer this?

Ring

Mesh

Star

Bus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava, Aarav, and Harry are playing a game of 'Network Topology Trivia'. They stumbled upon a tricky question: 'In which network topology does each node connect directly to every other node?'

Ring

Mesh

Star

Bus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mia, Anaya, and Rosie are planning a secret mission to transfer files over the internet without anyone snooping around. Which protocol should they use to ensure their files are transferred securely?

HTTP

FTP

SFTP

SMTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Imagine you're in a thrilling cyber chase with Sebastian, Sophia, and Leo. You need to assign IP addresses automatically to your devices to stay ahead. Which protocol would you use?

DNS

DHCP

FTP

HTTP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Neha, Aarav, and Jacob are playing a game of 'Network Defenders'. They need to protect their virtual network from unauthorized access. What method should they use?

Use WEP for wireless encryption

Disable SSID broadcast

Implement a firewall

Use an open network without a password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Samuel, Rohan, and Aarav are having a heated debate about encryption algorithms. Samuel thinks RSA is a symmetric encryption algorithm, Rohan believes it's AES, and Aarav is convinced it's SHA-256. Who is correct?

Samuel (RSA)

Rohan (AES)

Aarav (SHA-256)

None of them

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aarav, Elsie, and Kiara are playing a game of walkie-talkies. They can send messages in both directions, but not at the same time. What type of data transmission are they using?

Simplex

Half-duplex

Full-duplex

Quadruplex

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers