Common Assessment - Grade 11th - Spring 2025

Common Assessment - Grade 11th - Spring 2025

25 Qs

quiz-placeholder

Similar activities

Uji Teknis Junior Network Engineer

Uji Teknis Junior Network Engineer

Professional Development

23 Qs

Soal UH#1 - Mengenai Materi Kabel Jaringan dan Mikrotik

Soal UH#1 - Mengenai Materi Kabel Jaringan dan Mikrotik

KG - University

22 Qs

Cyber Shiksha Sept 22

Cyber Shiksha Sept 22

KG - University

20 Qs

Perform computer Networking

Perform computer Networking

KG - University

25 Qs

Perform computer Networking

Perform computer Networking

KG - University

25 Qs

SV: Dynamic routing RIP

SV: Dynamic routing RIP

KG - University

20 Qs

ESS1 Vocabulary: Landforms

ESS1 Vocabulary: Landforms

KG - University

21 Qs

SOAL US TEORI KEJURUAN TKJ 2023/2024

SOAL US TEORI KEJURUAN TKJ 2023/2024

KG - University

20 Qs

Common Assessment - Grade 11th - Spring 2025

Common Assessment - Grade 11th - Spring 2025

Assessment

Quiz

others

Hard

Created by

William Tsang

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Host-A has the IPv4 address and subnet mask 10.5.4.100 255.255.255.0. What is the network address of Host-A?
172.0.0
172.16.0.0
172.16.4.0
172.16.4.100

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What command sequence do you type to go from the > to the config#?

Type enable and then type show ip

Type enable and then type configure terminal

Type configure terminal and then type enable

Type config interface and then type configure terminal

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The subnet mask is used to identify the ______ and network portions of an IPv4 address.

Broadcast

Host

Classful

Mac

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

How many bits are there in an IPv4 address?

16 bits

32 bits

64 bits

128 bits

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

A Denial of Service

Malicious software that executes arbitrary code and installs copies of itself in the memory of the infected computer, which then infects other hosts.

Malicious software which attaches to another program to execute a specific unwanted function on a computer.

An application run to deny service to a website so that legitimate users cannot access the site, forcing the site to go down.

An application run to look like something else, and when downloaded and opened, it attacks the end user's computer from within.

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The world's largest WAN (wide area network) is the

Extranet

Ethernet

Internet

Intranet

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The components of an IPv4 address are

Logical address and physical address

Client address and server address

MAC address and IP address

Network address and host address

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?