IAS 2 Communication and Network Security Q4

IAS 2 Communication and Network Security Q4

University

25 Qs

quiz-placeholder

Similar activities

Algoritma Remedial RPL

Algoritma Remedial RPL

University

20 Qs

Jarkom STMIK MERCUSUAR 01

Jarkom STMIK MERCUSUAR 01

University

20 Qs

Ulangan Harian Analisis Data 8C

Ulangan Harian Analisis Data 8C

8th Grade - University

20 Qs

Coding Karel 2

Coding Karel 2

KG - University

20 Qs

ITE TEST 2

ITE TEST 2

University

20 Qs

Skill Competition Quiz 2024

Skill Competition Quiz 2024

10th Grade - University

20 Qs

SOFTWARE 7I

SOFTWARE 7I

7th Grade - University

20 Qs

Spreadsheet Fundamentals - Quiz2

Spreadsheet Fundamentals - Quiz2

University

20 Qs

IAS 2 Communication and Network Security Q4

IAS 2 Communication and Network Security Q4

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Darwin Vargas

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of network topology?

A. Star

B. Ring

C. Square

D. Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'port scanning' refer to?

A. Scanning physical ports on a device

B. Scanning network ports to find open services

C. Scanning data packets for malware

D. Scanning user accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to resolve IP addresses to MAC addresses?

A. ARP

B. DNS

C. DHCP

D. HTTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols is used for secure file transfer?

A. FTP

B. TFTP

C. SFTP

D. SNMP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is commonly used for secure web communication?

A. HTTP

B. FTP

C. SSH

D. HTTPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'DDoS' stand for?

A. Distributed Denial of Service

B. Data Distribution over System

C. Direct Data Over System

D. Digital Data Over Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a man-in-the-middle attack?

A. An attack where an unauthorized person intercepts and possibly alters the communication between two parties

B. An attack that targets database vulnerabilities

C. An attack that uses brute force to guess passwords

D. An attack that installs malware on a system

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?