Quiz 2 (Module 3) - BSIT 2-2

Quiz 2 (Module 3) - BSIT 2-2

University

25 Qs

quiz-placeholder

Similar activities

Data Networks

Data Networks

University

20 Qs

Network Security

Network Security

University

20 Qs

OP2 MIDTERM EXAM P2

OP2 MIDTERM EXAM P2

University

20 Qs

CN_U-1_Quiz

CN_U-1_Quiz

University

20 Qs

OSI Model Layers

OSI Model Layers

University

20 Qs

Layering Models

Layering Models

University

25 Qs

Q3 Transport Layer

Q3 Transport Layer

University

20 Qs

Network Protocol Quiz3

Network Protocol Quiz3

University

20 Qs

Quiz 2 (Module 3) - BSIT 2-2

Quiz 2 (Module 3) - BSIT 2-2

Assessment

Quiz

Computers

University

Hard

Created by

Arnold Narte

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of the MAC address?

Identifying devices within a local network

Routing data across different networks

Ensuring reliable data transmission

Encrypting sensitive information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What commonly motivates cybercriminals to attack networks compared to hactivists or state-sponsored hackers?

Financial gain

Fame seeking

Status among peers

Political reasons

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol operates at the application layer and is used for transferring files between devices?

HTTP

FTP

SMTP

SNMP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which layer of the OSI model is responsible for error detection and correction at the data link layer?

Physical layer

Data link layer

Network layer

Transport layer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol operates at the transport layer and provides error detection and correction?

HTTP

SMTP

TCP

UDP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which objective of secure communications is achieved by encrypting data?

Authentication

Availability

Confidentiality

Integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware has the primary objective of spreading across the network?

Worm

Virus

Trojan horse

Botnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?