Networking and Cybersecurity Quiz

Networking and Cybersecurity Quiz

University

25 Qs

quiz-placeholder

Similar activities

COGNITIONIS 2.0#07

COGNITIONIS 2.0#07

University

20 Qs

BCS Systems & Architecture Quiz 4

BCS Systems & Architecture Quiz 4

University - Professional Development

24 Qs

NT SURPRISE TEST

NT SURPRISE TEST

University

20 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

BSED English (Quiz 1)

BSED English (Quiz 1)

University

20 Qs

Microsoft Server Admin 98-365 Part 3

Microsoft Server Admin 98-365 Part 3

KG - Professional Development

22 Qs

Volume 1-2 Reloaded (TT1L Tue)

Volume 1-2 Reloaded (TT1L Tue)

University - Professional Development

20 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Networking and Cybersecurity Quiz

Networking and Cybersecurity Quiz

Assessment

Quiz

Professional Development

University

Easy

Created by

Aquika Bloggsatron

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a feature of Windows BitLocker?

Network firewall

Disk encryption

Antivirus scanner

File recovery tool

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following protocols operates at the Transport layer of the OSI model and provides reliable data transmission?

IP

UDP

TCP

ICMP

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which algorithm is used by the OSPF routing protocol to calculate the shortest path?

Bellman-Ford algorithm

Dijkstra's algorithm

A algorithm

Floyd-Warshall algorithm

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary purpose of BitLocker in Windows?

To encrypt entire drives

To protect against malware

To manage user accounts

To monitor network traffic

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the maximum theoretical throughput of a Gigabit Ethernet connection?

10 Mbps

100 Mbps

1 Gbps

10 Gbps

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which technique is commonly used in phishing attacks to deceive users into revealing sensitive information?

Encryption

Spoofing

Port scanning

Protocol analysis

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In IPv6, what is the size of each address?

32 bits

64 bits

128 bits

256 bits

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?