Network Security

Network Security

University

20 Qs

quiz-placeholder

Similar activities

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Memory-Mobo-Hard/Software

Memory-Mobo-Hard/Software

University

18 Qs

PARC Linux Basic Part 2

PARC Linux Basic Part 2

University

20 Qs

SQL Quiz

SQL Quiz

University

18 Qs

Jira

Jira

University

15 Qs

BIM1014 Quiz 2

BIM1014 Quiz 2

KG - University

15 Qs

CORLANG Week6-7

CORLANG Week6-7

10th Grade - University

20 Qs

Chapter 8. Securing Network Media and Devices

Chapter 8. Securing Network Media and Devices

University

20 Qs

Network Security

Network Security

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

AZAH NORMAN

Used 706+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ refers to the network command for how to format the conversation between two devices.

Addressing

Protocol

Media

Domain

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The network equipment used for the transmission of data are simply specialized computers that are designed for the acceptance, storage, and __________ of data signals.

understanding

structuring

retransmission

reforming

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ are considered the “traffic cops” for the flow of information inside and outside of the network, and to accomplish this have signaling rules called “protocols” on what to do for network failure for the rerouting of traffic.

Routers

Hubs

Gateways

Switches

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The flow of traffic is from a user’s client computer, to a __________, to a __________, and then out to the Internet or to a local data center to access the services needed.

switch, router

router, gateway

router, switch

switch, hub

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The OSI and TCP/IP models structure the __________ used for signaling and the separation of function in a network.

addressing

media

domain

protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security professional’s interest in __________ lies in defining the points that allow access for investigation, interruption, and attacks

network structures

network devices

network traffics

network segmentation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The __________, known as “Layer 2,” contains the broad start and stop signaling used to alert the switches to the beginning and ending of a transmission of data.

physical layer

application layer

transport layer

network layer

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?