
CyberSecurity
Authored by JOEL Colon
Computers
6th - 8th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which 3 levels in OSI Model are usually implemented in the software within the operating system?
Application, Presentation, Session
Data Link, Transport, Application
Transport, Session, Presentation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these protocols reside in Layer 3 - Network in the OSI Model?
IP and IPSec
TCP and IPSec
IP and TCP
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A netmask can be represented by which two ways?
Decimal Numbers (Netmask: 255.255.255.0) and Slash Notation (80.212.212.50/32)
Pound Notation (80.2012.212.50#24) and Decimal Numbers (Netmask: 255.255.255.0)
Slash Notation (80.212.212.50/32) and Pound Notation (80.2012.212.50#24)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is the broadcast address in this network: 172.16.24.0/24
172.16.24.255
172.16.24.0
172.16.24.1
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of these is a RFC 1918 ip address?
172.16.1.30
9.0.0.1
172.17.1.30
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Shortening an IPv6 address means:
Removing a group of only 0's
Converting 8 groups of 4 hexadecimal numbers into a valid IPv4 address
Removing unused groups of hexadecimal numbers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is spoofing?
Falsifying data, making something appear different than they really are
A way of terminating a 3-way handshake connection
A way server hides from attacks, a defensive mechanics
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?