Q2VydGlmaWVkIE5ldHdvcmsgRGVmZW5kZXI=W4

Q2VydGlmaWVkIE5ldHdvcmsgRGVmZW5kZXI=W4

KG

10 Qs

quiz-placeholder

Similar activities

T Level Support 5.2 Networks

T Level Support 5.2 Networks

12th Grade

15 Qs

Chapter 1 - 3 (Introduction to Network)

Chapter 1 - 3 (Introduction to Network)

University

12 Qs

L3 Scratch 26-30 Sept

L3 Scratch 26-30 Sept

3rd Grade

10 Qs

Instalasi Jaringan Wireless

Instalasi Jaringan Wireless

8th Grade

10 Qs

Cisco Netacad Intro to Cyber Security Chapter 3 Review

Cisco Netacad Intro to Cyber Security Chapter 3 Review

12th Grade

10 Qs

Programming Fundamentals

Programming Fundamentals

6th Grade

10 Qs

log on  to access

log on to access

8th Grade

14 Qs

CS 1

CS 1

5th Grade

12 Qs

Q2VydGlmaWVkIE5ldHdvcmsgRGVmZW5kZXI=W4

Q2VydGlmaWVkIE5ldHdvcmsgRGVmZW5kZXI=W4

Assessment

Quiz

Computers

KG

Easy

Created by

Eggz LaRon

Used 15+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which modulation technique is used by the Local Area Wireless Network (LAWN)?

Orthogonal Frequency-Division Multiplexing (OFDM)

Direct-Sequence Spread Spectrum (DSSS)

Frequency-hopping Spread Spectrum (FHSS)

Multiple-input, Multiple Output-Orthogonal Frequency Division Multiplexing (MIMOOFDM)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How to identify the baseline for normal traffic?

When the RST flag appears at the beginning and the ACK flag appears at the end of the connection

When the ACK flag appears at the beginning and the RST flag appears at the end of the connection

When the FIN flag appears at the beginning and the SYN flag appears at the end of the connection

When the SYN flag appears at the beginning, and the FIN flag appears at the end of the connection

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the attack signature analysis techniques carried out when attack signatures are contained in packet headers?

Content-based Signature Analysis

Context-based Signature Analysis

Atomic Signature-based Analysis

Composite Signature-based Analysis

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Identify the default port used FTP?

Port 44

Port 23

Port 21

Port 88

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the Service Set Identifier (SSID)?

It is a 32 alphanumeric sequence character that acts as a wireless identifier on the network

It is a 36 alphanumeric sequence character that acts as a wireless identifier on the network

It is a 28 alphanumeric sequence character that acts as a wireless identifier on the network

It is a 24 alphanumeric sequence character that acts as a wireless identifier on the network

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who is responsible for conveying company details after an incident?

IR Custodians

IR Officer

PR specialist

IR Manager

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who offers formal experienced testimony in court?

Evidence Manager

Evidence Investigator

Expert Witness

Incident Analyzer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers