
IAS 2 Communication and Network Security Q4
Authored by Darwin Vargas
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of network topology?
A. Star
B. Ring
C. Square
D. Mesh
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term 'port scanning' refer to?
A. Scanning physical ports on a device
B. Scanning network ports to find open services
C. Scanning data packets for malware
D. Scanning user accounts
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is used to resolve IP addresses to MAC addresses?
A. ARP
B. DNS
C. DHCP
D. HTTP
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following protocols is used for secure file transfer?
A. FTP
B. TFTP
C. SFTP
D. SNMP
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol is commonly used for secure web communication?
A. HTTP
B. FTP
C. SSH
D. HTTPS
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term 'DDoS' stand for?
A. Distributed Denial of Service
B. Data Distribution over System
C. Direct Data Over System
D. Digital Data Over Security
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a man-in-the-middle attack?
A. An attack where an unauthorized person intercepts and possibly alters the communication between two parties
B. An attack that targets database vulnerabilities
C. An attack that uses brute force to guess passwords
D. An attack that installs malware on a system
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?