NWC204 - SU25 - FUCT

NWC204 - SU25 - FUCT

University

20 Qs

quiz-placeholder

Similar activities

Privacy in Genomics

Privacy in Genomics

11th Grade - University

16 Qs

EnE427BSEnE4A Quiz 5 2nd BATCH

EnE427BSEnE4A Quiz 5 2nd BATCH

University

15 Qs

Wireless Networks Quiz 2

Wireless Networks Quiz 2

University

20 Qs

Module 1: Networking Today

Module 1: Networking Today

University

15 Qs

Credit

Credit

6th Grade - University

15 Qs

Food Web Crash Course

Food Web Crash Course

5th Grade - University

15 Qs

Wireless Networks Quiz 1

Wireless Networks Quiz 1

University

20 Qs

Introduction to Basic Electronics

Introduction to Basic Electronics

12th Grade - University

20 Qs

NWC204 - SU25 - FUCT

NWC204 - SU25 - FUCT

Assessment

Quiz

Science

University

Hard

Created by

Wayground Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?

Extranet

Intranet

LAN

WAN

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government" is a characteristic of...

Public clouds

Private clouds

Hybrid clouds

Community clouds

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack slows down or crashes equipment and programs?

Firewall

Virus, worm, or Trojan horse

Zero-day or Zero-hour

Virtual Private Network (VPN)

Denial of Service (DoS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature contains options such as Public, Private, Custom and Hybrid?

BYOD

Video communications

Cloud computing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data interception and theft...

secretly collects information about the user

slow or crash applications and processes on a network device

captures private information from an organization’s network

contain malicious software or code running on a user device

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

Firewall

Virus, worm, or Trojan horse

Zero-day or Zero-hour

Virtual Private Network (VPN)

Denial of Service (DoS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature describes using personal tools to access information and communicate across a business or campus network?

BYOD

Video communications

Cloud computing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Science