IAS 2 Communication and Network Security Q4

IAS 2 Communication and Network Security Q4

University

25 Qs

quiz-placeholder

Similar activities

Topic 2.1.3

Topic 2.1.3

University

20 Qs

ITTWO0Four_2A G1

ITTWO0Four_2A G1

University

20 Qs

โทโพโลยีเครือข่าย

โทโพโลยีเครือข่าย

University

20 Qs

Cloud Architecting - Week 5

Cloud Architecting - Week 5

University

20 Qs

CN Assignment 2

CN Assignment 2

University

20 Qs

computer network

computer network

University

20 Qs

Unit 10 - Client - Server model

Unit 10 - Client - Server model

12th Grade - University

20 Qs

c.i.s.c.o

c.i.s.c.o

University

20 Qs

IAS 2 Communication and Network Security Q4

IAS 2 Communication and Network Security Q4

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of network topology?

A. Star

B. Ring

C. Square

D. Mesh

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'port scanning' refer to?

A. Scanning physical ports on a device

B. Scanning network ports to find open services

C. Scanning data packets for malware

D. Scanning user accounts

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is used to resolve IP addresses to MAC addresses?

A. ARP

B. DNS

C. DHCP

D. HTTP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols is used for secure file transfer?

A. FTP

B. TFTP

C. SFTP

D. SNMP

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is commonly used for secure web communication?

A. HTTP

B. FTP

C. SSH

D. HTTPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'DDoS' stand for?

A. Distributed Denial of Service

B. Data Distribution over System

C. Direct Data Over System

D. Digital Data Over Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a man-in-the-middle attack?

A. An attack where an unauthorized person intercepts and possibly alters the communication between two parties

B. An attack that targets database vulnerabilities

C. An attack that uses brute force to guess passwords

D. An attack that installs malware on a system

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?