Networking and Cybersecurity Quiz

Networking and Cybersecurity Quiz

University

25 Qs

quiz-placeholder

Similar activities

Digital Transformation Quiz

Digital Transformation Quiz

University

20 Qs

BSED English (Quiz 1)

BSED English (Quiz 1)

University

20 Qs

Volume 1-2 Reloaded (TT1L Tue)

Volume 1-2 Reloaded (TT1L Tue)

University - Professional Development

20 Qs

ECCONET  Presidential Decrees and other Republic Acts

ECCONET Presidential Decrees and other Republic Acts

University

20 Qs

Cyber 2 Module 5

Cyber 2 Module 5

9th Grade - Professional Development

20 Qs

Incident Handling

Incident Handling

University

20 Qs

BCS Systems & Architecture Quiz 1

BCS Systems & Architecture Quiz 1

University - Professional Development

20 Qs

BCS Network Security Test 7

BCS Network Security Test 7

University - Professional Development

20 Qs

Networking and Cybersecurity Quiz

Networking and Cybersecurity Quiz

Assessment

Quiz

Professional Development

University

Easy

Created by

Aquika Bloggsatron

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a feature of Windows BitLocker?

Network firewall

Disk encryption

Antivirus scanner

File recovery tool

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following protocols operates at the Transport layer of the OSI model and provides reliable data transmission?

IP

UDP

TCP

ICMP

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which algorithm is used by the OSPF routing protocol to calculate the shortest path?

Bellman-Ford algorithm

Dijkstra's algorithm

A algorithm

Floyd-Warshall algorithm

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary purpose of BitLocker in Windows?

To encrypt entire drives

To protect against malware

To manage user accounts

To monitor network traffic

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the maximum theoretical throughput of a Gigabit Ethernet connection?

10 Mbps

100 Mbps

1 Gbps

10 Gbps

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which technique is commonly used in phishing attacks to deceive users into revealing sensitive information?

Encryption

Spoofing

Port scanning

Protocol analysis

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In IPv6, what is the size of each address?

32 bits

64 bits

128 bits

256 bits

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?