WJEC ICT  - Chapter 2 - Network Protocols

WJEC ICT - Chapter 2 - Network Protocols

10th Grade

15 Qs

quiz-placeholder

Similar activities

Latihan Jaringan Dasar PSAS

Latihan Jaringan Dasar PSAS

10th Grade

20 Qs

GIS Unit-1

GIS Unit-1

University

15 Qs

2561-1-ระบบสื่อสารสำหรับเครือข่ายคอมพิวเตอร์

2561-1-ระบบสื่อสารสำหรับเครือข่ายคอมพิวเตอร์

12th Grade

20 Qs

Kuis PPJ - Materi VLSM

Kuis PPJ - Materi VLSM

11th Grade

15 Qs

ULANGAN HARIAN Semester 2

ULANGAN HARIAN Semester 2

10th Grade

12 Qs

Network

Network

10th - 11th Grade

10 Qs

Quiz on neural network unit II

Quiz on neural network unit II

University

16 Qs

tik  kelas 9

tik kelas 9

12th Grade

10 Qs

WJEC ICT  - Chapter 2 - Network Protocols

WJEC ICT - Chapter 2 - Network Protocols

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Jordan Firth

Used 20+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of data is most vulnerable to interception during packet sniffing?

Data transmitted over wired connections.

Data transmitted over encrypted connections.

Unencrypted data transmitted over public Wi-Fi.

Data transmitted through secure VPNs.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to send emails over the internet?

HTTP (Hypertext Transfer Protocol)

FTP (File Transfer Protocol)

SMTP (Simple Mail Transfer Protocol)

POP (Post Office Protocol)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a network protocol?

A physical device used to connect computers in a network

A set of rules and conventions that define how devices communicate in a network

The name of a specific network

The maximum speed of a network connection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is responsible for the reliable delivery of data packets in a network?

HTTP

TCP

IMAP

POP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary security risk associated with packet sniffing?

Overloading network switches.

Exposure of sensitive information.

Unauthorized access to the internet.

Slowing down network speed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used for secure data transmission over the internet, often indicated by "https://" in a URL?

FTP

HTTPS

SMTP

HTTP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is responsible for routing data packets across multiple networks in the internet?

IMAP

HTTP

TCP

IP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?