Networking Quiz

Networking Quiz

University

34 Qs

quiz-placeholder

Similar activities

Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

University

29 Qs

Computer Networking

Computer Networking

University

30 Qs

UNIT II MOBILE NETWORK LAYER

UNIT II MOBILE NETWORK LAYER

University

30 Qs

38-74 mmt

38-74 mmt

University

38 Qs

CCNA 1 ITNv6 Chapter 5

CCNA 1 ITNv6 Chapter 5

University

29 Qs

CompTIA IT Fundamentals+ Ch. 08 - Networking Concepts

CompTIA IT Fundamentals+ Ch. 08 - Networking Concepts

University - Professional Development

30 Qs

3d151 CDC Vol 2 Unit 2

3d151 CDC Vol 2 Unit 2

University - Professional Development

39 Qs

EC8071_CR_MODEL EXAM_QUIZ_V_(15.10.2020)-MORNING-PART-A

EC8071_CR_MODEL EXAM_QUIZ_V_(15.10.2020)-MORNING-PART-A

University

30 Qs

Networking Quiz

Networking Quiz

Assessment

Quiz

Other

University

Hard

Created by

PHZINN PHZINN

FREE Resource

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service is provided by POP3?

Retrieves email from the server by downloading the email to the local mail application of the client.

An application that allows real-time chatting among remote users.

Allows remote access to network devices and servers.

Uses encryption to provide secure remote access to network devices and servers.

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What two security solutions are most likely to be used only in a corporate environment? (Choose two.)

Virtual private networks (VPNs)

Intrusion prevention systems (IPS)

Antispyware

Strong passwords

Antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What characteristic describes antivirus software?

Applications that protect end devices from becoming infected with malicious software.

A network device that filters access and traffic coming into a network.

A tunneling protocol that provides remote users with secure access into the network of an organization.

Software on a router that filters traffic based on IP addresses or applications.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

It checks the value of the TTL field and if it is 0, it discards the packet and sends a Destination Unreachable message to the source host.

It checks the value of the TTL field and if it is 100, it discards the packet and sends a Destination Unreachable message to the source host.

It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host.

It increments the value of the TTL field by 1 and if the result is 100, it discards the packet and sends a Parameter Problem message to the source host.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting?

TFTP (Trivial File Transfer Protocol)

DNS

DHCP

SMTP

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

Generate two-way pre-shared keys.

Configure the IP domain name on the router.

Generate the SSH keys.

Configure DNS on the router.

Enable inbound vty SSH sessions.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two functions are performed at the MAC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)

Implements trailer with frame check sequence for error detection.

Places information in the Ethernet frame that identifies which network layer protocol is being encapsulated by the frame.

Handles communication between upper layer networking software and Ethernet NIC hardware.

Adds Ethernet control information to network protocol data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?