Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

University

15 Qs

quiz-placeholder

Similar activities

MTA Networking Fundamentals: Lesson 1

MTA Networking Fundamentals: Lesson 1

11th Grade - University

16 Qs

Cyber Security Quiz: Protect and Analyse

Cyber Security Quiz: Protect and Analyse

University

10 Qs

Virtual Private Network ( VPN )

Virtual Private Network ( VPN )

University

14 Qs

Mobile IP and WAP

Mobile IP and WAP

University

10 Qs

Hacker

Hacker

University

15 Qs

CompTIA A+ Objectives 2.1-2.4

CompTIA A+ Objectives 2.1-2.4

University

10 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

Security IPSec

Security IPSec

University

10 Qs

Netw2-Quiz No.1 (final term)

Netw2-Quiz No.1 (final term)

Assessment

Quiz

Computers

University

Easy

Created by

PERCIVAL ADAO

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the four critical functions of VPN, what function is preventing the data to be read or copied as the data is being transported?

Confidentiality

Authentication

Data Integrity

Access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method of scrambling data

before transmitting it onto the Internet?

Confidentiality

Authentication

Encryption

Decryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is WAN technology that adds security and anonymity to users when they connect to web-based services and sites and the user's actual public IP address and “tunnels” traffic between the user's device and the remote server?

LAN

VPN

BGP

IGRP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a protocol for transferring data securely from one network end-point to another?

Networking protocol

WAN protocol

Encryption protocol

Tunneling protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a data-link layer protocol for WAN, developed by Microsoft that enables network traffic to be encapsulated and routed over an unsecured public network such as the Internet?

Point-to-Point Tunneling Protocol

Internet Protocol Security

Layer 2 Tunneling Protocol

Tunneling protocol

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer networking protocol used by Internet service providers (ISPs) to enable virtual private network (VPN) operations?

Point-to-Point Tunneling Protocol

Internet Protocol Security

Layer 2 Tunneling Protocol

Tunneling protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a ____ port used for L2TP communication because it does not provide any security for data such as encryption and confidentiality, an encryption protocol such as the Internet.

HTTPS

HTTP

TCP

UDP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?