
computer networks
Authored by John Ademola
others
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
OPEN ENDED QUESTION
30 sec • Ungraded
Name
Evaluate responses using AI:
OFF
2.
OPEN ENDED QUESTION
30 sec • Ungraded
Group
Evaluate responses using AI:
OFF
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question 1: What is the purpose of a firewall?
A: To identify if a network has been or is at risk of being hacked.
B: To stop unauthorised access to a network or device from the internet or other network.
C: To make sure all users have access to the data that is relevant for them.
D: To update the anti-virus automatically on all user's computers regularly.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question 2: When a user logs in, they are asked for their username and password. This proves that they are who they say they are. What is this called?
A: Access rights
B: Authentication
C: Validation
D: Verification
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question 3: Some smartphones now allow you to unlock them using a fingerprint. What is this method of data capture called?
A: Two-step authentication
B: PIN
C: Password cookie
D: Biometrics
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question 4: Someone has guessed the password to access a company's network. They have logged on and taken copies of some of the files and changed others. What is this called?
A: Pharming
B: Phishing
C: Scamming
D: Hacking
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question 5: Which of the following piece of network hardware would help you connect a tablet computer to your home network?
A: HTTP
B:WAP
C: RFID
D: NFC
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?