IAS 2 Communication and Network Security Q4

IAS 2 Communication and Network Security Q4

University

25 Qs

quiz-placeholder

Similar activities

Communication and networks

Communication and networks

University

20 Qs

INNOVATION QUIZ-1

INNOVATION QUIZ-1

University

20 Qs

Tutorial IoT 1

Tutorial IoT 1

University

20 Qs

EPlus Certified Computer Network Specialist

EPlus Certified Computer Network Specialist

University

20 Qs

mapel tjkt

mapel tjkt

11th Grade - University

20 Qs

BCTAA Network Setup Quiz

BCTAA Network Setup Quiz

12th Grade - University

20 Qs

TO: 2.1 Motherboard

TO: 2.1 Motherboard

University

20 Qs

IP Address

IP Address

University

20 Qs

IAS 2 Communication and Network Security Q4

IAS 2 Communication and Network Security Q4

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of network topology?

A. Star

B. Ring

C. Square

D. Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'port scanning' refer to?

A. Scanning physical ports on a device

B. Scanning network ports to find open services

C. Scanning data packets for malware

D. Scanning user accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to resolve IP addresses to MAC addresses?

A. ARP

B. DNS

C. DHCP

D. HTTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols is used for secure file transfer?

A. FTP

B. TFTP

C. SFTP

D. SNMP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is commonly used for secure web communication?

A. HTTP

B. FTP

C. SSH

D. HTTPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'DDoS' stand for?

A. Distributed Denial of Service

B. Data Distribution over System

C. Direct Data Over System

D. Digital Data Over Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a man-in-the-middle attack?

A. An attack where an unauthorized person intercepts and possibly alters the communication between two parties

B. An attack that targets database vulnerabilities

C. An attack that uses brute force to guess passwords

D. An attack that installs malware on a system

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?