Quiz 2 (Module 3) - BSIT 2-2

Quiz 2 (Module 3) - BSIT 2-2

University

25 Qs

quiz-placeholder

Similar activities

CSC1212 - Chapter 6 (Network Protocols)

CSC1212 - Chapter 6 (Network Protocols)

University

20 Qs

OP2 MIDTERM EXAM P2

OP2 MIDTERM EXAM P2

University

20 Qs

Layering Models

Layering Models

University

25 Qs

OSI layers

OSI layers

9th Grade - University

21 Qs

c.i.s.c.o

c.i.s.c.o

University

20 Qs

internet

internet

University

21 Qs

Computer Networks - MCS-631

Computer Networks - MCS-631

University

20 Qs

Computer Networking

Computer Networking

University

20 Qs

Quiz 2 (Module 3) - BSIT 2-2

Quiz 2 (Module 3) - BSIT 2-2

Assessment

Quiz

Computers

University

Hard

Created by

Arnold Narte

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of the MAC address?

Identifying devices within a local network

Routing data across different networks

Ensuring reliable data transmission

Encrypting sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What commonly motivates cybercriminals to attack networks compared to hactivists or state-sponsored hackers?

Financial gain

Fame seeking

Status among peers

Political reasons

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol operates at the application layer and is used for transferring files between devices?

HTTP

FTP

SMTP

SNMP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which layer of the OSI model is responsible for error detection and correction at the data link layer?

Physical layer

Data link layer

Network layer

Transport layer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol operates at the transport layer and provides error detection and correction?

HTTP

SMTP

TCP

UDP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which objective of secure communications is achieved by encrypting data?

Authentication

Availability

Confidentiality

Integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware has the primary objective of spreading across the network?

Worm

Virus

Trojan horse

Botnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?