ИКТ тест

ИКТ тест

University

57 Qs

quiz-placeholder

Similar activities

NET1L - Lesson 1 (Network Components)

NET1L - Lesson 1 (Network Components)

University

58 Qs

MdExm 2024-2025 S1

MdExm 2024-2025 S1

University

60 Qs

Chapter 5.4

Chapter 5.4

University

53 Qs

PRETEST KONKE  XI TJKT

PRETEST KONKE XI TJKT

9th Grade - University

60 Qs

QUIZ KECERDASAN KECEPATAN KELAS XI TKJ - MIKROTIK

QUIZ KECERDASAN KECEPATAN KELAS XI TKJ - MIKROTIK

11th Grade - University

55 Qs

CBT - Revision # 3

CBT - Revision # 3

12th Grade - University

54 Qs

Post Test

Post Test

University

55 Qs

Networking Protocols Quiz

Networking Protocols Quiz

10th Grade - University

54 Qs

ИКТ тест

ИКТ тест

Assessment

Quiz

Computers

University

Hard

Created by

Адилям Нурахуновна

FREE Resource

57 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which version of IP addresses is the most widely used and currently the dominant protocol on the internet?

IP version 6 (IPv6)

IP version 4 (IPv4)

IP version 5

IPX

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many bits are in an IPv4 address?

64 bits

128 bits

32 bits

16 bits

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of IP address is used to identify a specific device on a local network, typically assigned by a router?

Private IP address

Public IP address

Network address

Logical address

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the purpose of the subnet mask in IP addressing?

To specify the network portion of an IP addres

To assign IP addresses dynamically

To resolve domain names

To act as a gateway

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which version of the Internet Protocol introduced 128-bit IP addresses?

IPv4

IPv5

IPv6

IPX

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the primary goal of cybersecurity?

To manage network addresses

To improve internet speed

To protect systems and data from unauthorized access

To create backup systems

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is a common method of authentication used in cybersecurity to verify a user's identity?

Passwords

Firewalls

Proxy servers

Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?