Networking Quiz

Networking Quiz

University

18 Qs

quiz-placeholder

Similar activities

Трансформації та моделювання руху

Трансформації та моделювання руху

University

21 Qs

TECHNOVA

TECHNOVA

University

15 Qs

Day 5 Quiz_001

Day 5 Quiz_001

University

15 Qs

Rebecca Zamoloa

Rebecca Zamoloa

KG - Professional Development

21 Qs

Networking Today Quiz

Networking Today Quiz

University

20 Qs

EC8071_CR_MODELEXAM-III (24.10.2020)_PART-B

EC8071_CR_MODELEXAM-III (24.10.2020)_PART-B

University

15 Qs

Seminar 4 - Computer Networks

Seminar 4 - Computer Networks

University

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

Networking Quiz

Networking Quiz

Assessment

Quiz

Other

University

Medium

Created by

PHZINN PHZINN

Used 2+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician with a PC is using multiple applications while connected to the Internet. How is the PC able to keep track of the data flow between multiple application sessions and have each application receive the correct packet flows?

The data flow is being tracked based on the destination MAC address of the technician PC.

The data flow is being tracked based on the source port number that is used by each application.

The data flow is being tracked based on the source IP address that is used by the PC of the technician.

The data flow is being tracked based on the destination IP address that is used by the PC of the technician.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator is adding a new LAN to a branch office. The new LAN must support 61 connected devices. What is the smallest network mask that the network administrator can use for the new network?

255.255.255.240

255.255.255.224

255.255.255.192

255.255.255.128

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Refer to the exhibit. Match the network with the correct IP address and prefix that will satisfy the usable host addressing requirements for each network. (Not all options are used.)

Evaluate responses using AI:

OFF

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes a DoS attack?

the use of stolen credentials to access private data

a network device that filters access and traffic coming into a network

software that is installed on a user device and collects information about the user

an attack that slows or crashes a device or network service

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Match the application protocols to the correct transport protocols.

Evaluate responses using AI:

OFF

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service is provided by SMTP?

Allows clients to send email to a mail server and the servers to send email to other servers.

Allows remote access to network devices and servers.

Uses encryption to provide secure remote access to network devices and servers.

An application that allows real-time chatting among remote users.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scenario describes a function provided by the transport layer?

A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.

A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header.

A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?