computer networks

computer networks

22 Qs

quiz-placeholder

Similar activities

Tomás Carlos Heras García_Curso

Tomás Carlos Heras García_Curso

KG

23 Qs

24-25.SocialStudies.USHistory1.Benchmark3

24-25.SocialStudies.USHistory1.Benchmark3

6th - 8th Grade

25 Qs

PERR MP03 UF2 Cosmètics color

PERR MP03 UF2 Cosmètics color

KG - University

25 Qs

11_2 情報セキュリティ管理

11_2 情報セキュリティ管理

KG - University

27 Qs

Saber vs. Conocer

Saber vs. Conocer

KG - University

20 Qs

4.8 Virginia's Natural Resources SOL Review

4.8 Virginia's Natural Resources SOL Review

5th Grade

20 Qs

PAT (PJOK VIII AB)

PAT (PJOK VIII AB)

KG - University

22 Qs

computer networks

computer networks

Assessment

Quiz

others

Practice Problem

Easy

Created by

John Ademola

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

OPEN ENDED QUESTION

30 sec • Ungraded

Name

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

30 sec • Ungraded

Group

Evaluate responses using AI:

OFF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 1: What is the purpose of a firewall?

A: To identify if a network has been or is at risk of being hacked.
B: To stop unauthorised access to a network or device from the internet or other network.
C: To make sure all users have access to the data that is relevant for them.
D: To update the anti-virus automatically on all user's computers regularly.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 2: When a user logs in, they are asked for their username and password. This proves that they are who they say they are. What is this called?

A: Access rights
B: Authentication
C: Validation
D: Verification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 3: Some smartphones now allow you to unlock them using a fingerprint. What is this method of data capture called?

A: Two-step authentication
B: PIN
C: Password cookie
D: Biometrics

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 4: Someone has guessed the password to access a company's network. They have logged on and taken copies of some of the files and changed others. What is this called?

A: Pharming
B: Phishing
C: Scamming
D: Hacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question 5: Which of the following piece of network hardware would help you connect a tablet computer to your home network?

A: HTTP
B:WAP
C: RFID
D: NFC

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?