Networking and Cybersecurity Quiz

Networking and Cybersecurity Quiz

University

25 Qs

quiz-placeholder

Similar activities

Go tech..

Go tech..

University

20 Qs

Operating System Concepts

Operating System Concepts

University

20 Qs

PROFE2 313 - BSIS 3A - Quiz 2

PROFE2 313 - BSIS 3A - Quiz 2

University

25 Qs

You asked for this

You asked for this

University

24 Qs

Microsoft Server Admin 98-365 Part 3

Microsoft Server Admin 98-365 Part 3

KG - Professional Development

22 Qs

AE21-IATB - Midterm Short Quiz (M6-7)

AE21-IATB - Midterm Short Quiz (M6-7)

University

22 Qs

Renewable Energy - TED-Ed

Renewable Energy - TED-Ed

10th Grade - Professional Development

20 Qs

MS Elite Friday's Special

MS Elite Friday's Special

KG - Professional Development

20 Qs

Networking and Cybersecurity Quiz

Networking and Cybersecurity Quiz

Assessment

Quiz

Professional Development

University

Easy

Created by

Aquika Bloggsatron

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a feature of Windows BitLocker?

Network firewall

Disk encryption

Antivirus scanner

File recovery tool

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following protocols operates at the Transport layer of the OSI model and provides reliable data transmission?

IP

UDP

TCP

ICMP

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which algorithm is used by the OSPF routing protocol to calculate the shortest path?

Bellman-Ford algorithm

Dijkstra's algorithm

A algorithm

Floyd-Warshall algorithm

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary purpose of BitLocker in Windows?

To encrypt entire drives

To protect against malware

To manage user accounts

To monitor network traffic

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the maximum theoretical throughput of a Gigabit Ethernet connection?

10 Mbps

100 Mbps

1 Gbps

10 Gbps

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which technique is commonly used in phishing attacks to deceive users into revealing sensitive information?

Encryption

Spoofing

Port scanning

Protocol analysis

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In IPv6, what is the size of each address?

32 bits

64 bits

128 bits

256 bits

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?