B.2.2 Practice Test

B.2.2 Practice Test

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Module 11 - Network Design

Module 11 - Network Design

12th Grade

15 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Network Security Y8 Starter

Network Security Y8 Starter

9th Grade

15 Qs

1.3 - Client-Server and Peer to Peer Networks

1.3 - Client-Server and Peer to Peer Networks

8th - 10th Grade

15 Qs

WEB APPLICATIONS AND SECURITY

WEB APPLICATIONS AND SECURITY

10th Grade

15 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Network Hardware

Network Hardware

8th - 11th Grade

15 Qs

B.2.2 Practice Test

B.2.2 Practice Test

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Amy Merchant

Used 19+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a drawback to satellite internet?

High latency

Less security

Limited availability

Low latency

Answer explanation

Media Image

-The main downside to a satellite connection is latency. Because data has to travel to space and back, it can take a few seconds longer to exchange data. While this may not seem like much, it makes a big difference for real-time applications, like online gaming and video conferencing.

  • -Satellite internet is widely available; this is one of the main advantages to satellite internet.

-Satellite internet is not less secure than other options.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Flash memory is used in a variety of devices and comes in a variety of form factors. Choose the terms used to describe these devices. (Select two.)

Floppy disks

Memory cards

Zip disks

Optical disks

Thumb drives

Answer explanation

Explanation

A term used to describe a Flash drive is a Thumb drive. This device connects to a computer using a USB connector.

-The term "memory card" describes the flash memory devices used in cameras and video recorders.

-Floppy drives are older, obsolete devices.

-Optical disks are used in CD, DVD, and Blu-Ray drives.

Zip disks are obsolete devices.-

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A network administrator for a legal firm has installed a Wi-Fi access point in company headquarters and is now ready to configure the access point from a company laptop computer. What is the first step that the administrator needs to take to begin configuring the access point?

Select the correct 802.11 standard.

Enter the SSID of the access point.

Establish a Bluetooth connection.

Enter the IP address of the access point web configuration page.

Answer explanation

Explanation

Accessing the configuration of your access point is normally completed using a web configuration page which is normally accessed by using the IP address of the device.

-While configuring the SSID (Service Set Identification) is part of configuring the access point, it is not used to access the configuration pages.

-Bluetooth is a technology that allows wireless communication between devices without using a modem or router. However, in this case, the administrator is attempting to access the AP router to configure the wireless network.

-The 802.11 standard for the access point is already established by the manufacturer and is not part of configuring the access point.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the maximum working range of a Class 3 Bluetooth device?

1 meter

0.5 meters

100 meters

10 meters

Answer explanation

Explanation

Class 3 Bluetooth devices can work at a maximum range of 1 meter or 3 feet.

Class 2 Bluetooth devices can work at a maximum range of 10 meters or 33 feet.

Class 1 Bluetooth devices can work at a maximum range of 100 meters or 238 feet.

Class 4 Bluetooth devices can work at a maximum range of 0.5 meters or 1.5 feet.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following internet protocols makes sure that data packets are assembled on the receiving end in the correct order so that a complete data package is delivered?

Domain Name System (DNS)

Transmission Control Protocol (TCP)

Internet Protocol (IP)

HyperText Transfer Protocol (HTTP)

Answer explanation

Explanation

-Once they're received at the destination, data packets are reassembled in the correct order using TCP.

-Internet Protocol (IP) is a set of rules that makes sure data packets arrive at the correct destination. It does not focus on assembling the packets in the correct order to deliver a complete data package.

-DNS is a service that maps domain names (like testout.com or google.com) to IP addresses. It does not ensure that data packets are assembled in the correct order.

-HyperText Transfer Protocol (HTTP) is used for accessing pages on the world wide web. It does not ensure that data packets are assembled in the correct order.-

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings?

Disabling DHCP

Disabling SSID broadcast

Changing the default administrative password

Implementing MAC address filtering

Answer explanation

Explanation

To prevent administrative access to the access point, change the default administrator password. If you do not change the password, users can search the Internet for the default password and use it to gain access to the access point and make configuration changes.

Disabling SSID broadcast, disabling DHCP, and using MAC address filtering helps prevent unauthorized access to the wireless network.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?

Token Ring

Bluetooth

802.11n

Ethernet

ArcNet

Answer explanation

Explanation

Ethernet is a wired, local area network (LAN) standard. Most laptops and desktop computers have built-in Ethernet network ports.

Bluetooth is a wireless standard that allows the creation of short-range Personal Area Networks (PANs). Token Ring and ArcNet are older wired network standards that are nearly obsolete and not commonly used in a modern LAN. 802.11n is a wireless standard used in local area networks.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?