Final Review

Final Review

9th - 12th Grade

48 Qs

quiz-placeholder

Similar activities

US Kelas XII Jaringan, Komputer SMK Samudera Bandar Lampung

US Kelas XII Jaringan, Komputer SMK Samudera Bandar Lampung

12th Grade

50 Qs

Ujian Penilaian Administrasi infrastruktur Jaringan (AIJ)

Ujian Penilaian Administrasi infrastruktur Jaringan (AIJ)

12th Grade - University

50 Qs

Teknologi Layanan Jaringan

Teknologi Layanan Jaringan

12th Grade

45 Qs

CCNA 2

CCNA 2

11th Grade

44 Qs

CCST Networking Basics, Unit test

CCST Networking Basics, Unit test

12th Grade

50 Qs

IP Address

IP Address

11th Grade

50 Qs

CISCO ROUTING

CISCO ROUTING

11th Grade

50 Qs

THIRD QUARTER ASSESSMENT IN CSS - GRADE 9

THIRD QUARTER ASSESSMENT IN CSS - GRADE 9

9th Grade - University

50 Qs

Final Review

Final Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

JJ Moss

Used 1+ times

FREE Resource

48 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the CIA triad in cybersecurity?

Protecting network speed

Ensuring security goals of confidentiality, integrity, and availability

Creating secure passwords

Monitoring system logs

Answer explanation

The CIA triad is fundamental in cybersecurity, focusing on the security goals of confidentiality, integrity, and availability. This ensures that data is protected, accurate, and accessible when needed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following represents 'integrity' in the CIA triad?

Ensuring data remains unchanged

Preventing unauthorized access

Encrypting all sensitive files

Making data available at all times

Answer explanation

In the CIA triad, 'integrity' refers to ensuring data remains unchanged and accurate. This means protecting data from unauthorized alterations, making 'Ensuring data remains unchanged' the correct representation of integrity.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts files and demands a ransom?

Adware

Ransomware

Trojan horse

Rootkit

Answer explanation

Ransomware is a type of malware that encrypts files on a victim's system and demands a ransom for the decryption key. Unlike adware, Trojan horses, or rootkits, ransomware specifically targets data for financial gain.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a router in a network?

To connect to the internet

To route traffic between different networks

To assign IP addresses

To encrypt network data

Answer explanation

The main purpose of a router is to route traffic between different networks, directing data packets to their appropriate destinations. While routers can connect to the internet and assign IP addresses, their primary function is traffic routing.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which device connects computers within the same VLAN?

Switch

Router

Firewall

Bridge

Answer explanation

A switch connects computers within the same VLAN by forwarding data packets based on MAC addresses. Unlike routers, which connect different networks, switches operate at Layer 2 of the OSI model, making them ideal for VLAN communication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which layer of the OSI model manages data routing between networks?

Transport

Network

Application

Data Link

Answer explanation

The Network layer of the OSI model is responsible for routing data between different networks. It determines the best path for data transmission, making it the correct choice for managing data routing.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OSI layer is responsible for converting binary data into physical signals?

Physical

Data Link

Network

Session

Answer explanation

The Physical layer of the OSI model is responsible for converting binary data into physical signals, such as electrical impulses or light signals, enabling data transmission over various media.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?