This is your first module examination for BASIC NETWORKING AND INFORMATION SECURITY. Enter your full name and password below(ask the password from your instructor).
GOOD LUCK!
Expansion
Bandwidth
Interference
Installation
Rate this question:
A. Token-Ring Architecture
B. Arcnet Architecture
C. Star Network Structure
D. Hybrid Network Structure
Rate this question:
Protocol
Internet
Application
Network
Rate this question:
WAN
LAN
Network topology
Application
Rate this question:
Application
Network
File Sharing
Motherboard
Rate this question:
LAN
WAN
MAN
WMAN
Rate this question:
IEEE 802.3
EEIE 803.2
EEEI 803.2
EIEE 802.3
Rate this question:
Internal Modem and External Modem
Internal Bridge and External Modem
Internal Hub and External Hub
Internal Repeater and External Repeater
Rate this question:
Cable
Light
Wireless
Modems
Rate this question:
Light
Multiplexers
Cable
Cost
Rate this question:
Bus Network Structure
Star Network Structure
Ring Network Structure
Hybrid Network Structure
Rate this question:
Bus Network Structure
Hybrid Network Structure
Star Network Structure
Ring Network Structure
Rate this question:
Token-Ring Architecture
Arcnet Architecture
Peer-to-peer architecture
Rate this question:
Security
Ease of access
Corrupting
Cost
Computer crime
Rate this question:
Open Systems Interconnection
Open Service Interconnection
On-board Systems Interconnection
Open Systems International
Rate this question:
Segmenting data so that it flows uninterrupted through the network
Physical devices used on a network to function
Wrapping data in a particular protocol header
Moving data in groups so that is stays together
Rate this question:
Organizes and manages all the activities on a network. On some networks, one central computer, called a server, is responsible for running the network operating system.
A device that joins networks together. The most common connectors are bridges and sautés.
Lets the network interface card in a computer communicate with the network
Rate this question:
Bridges
Routers
Hubs
Switches
Rate this question:
Backups
Viruses
Firewalls
Proxy Service
Rate this question:
Fire
Natural Disasters
Crackers
Theft
Rate this question:
Physical level
Logical level
Network level
Presentation
Rate this question:
Multiplexers
Light
Wireless
Transmission Media
Rate this question:
Network
World wide web
IP address
Server
Rate this question:
Sharing information
Sharing resources
Logging on
Hacking
Rate this question:
Administrator
Centralized Network Layout
Hybrid Network
Distributed Network Layout
Rate this question:
Gateways
Cables
Modems
Bridge Routers
Rate this question:
Manager, Client
Server, Boss
Client, Manager
Server, Client
Rate this question:
Modem
Bridge Router
Multiplexer
Cables
Rate this question:
TCP
HTTP
FTP
UDP
Rate this question:
Transistor
Telephone line
Cables
Spectrum analyzer
Satellites
Rate this question:
Bus Network Structure
Hybrid Network Structure
Star Network Structure
Ring Network Structure
Rate this question:
Bandwidth
Transfer of information
Size of Network
Gigabyte Ethernet
Rate this question:
Rule of thumb
Size of the network
Bus
Peer-to-peer architecture
Rate this question:
LAN
MAN
WAN
WMAN
Rate this question:
Token-Ring Architecture
Arcnet Architecture
Appletalk Architecture
Ethernet Architecture
Rate this question:
Switch
Hub
Router
Repeater
Rate this question:
Network Architecture
Architecture Consideration
Ethernet Architecture
Gigabit Ethernet
Rate this question:
Application layer
Presentation layer
Session layer
Transport layer
Rate this question:
Radiation
Microwave
Token
Rate this question:
Server
Client
Node
Administrator
Rate this question:
Light
Cable
Multiplexers
Gateways
Rate this question:
WMAN
MAN
WAN
LAN
Rate this question:
Network Interface
Internet
Transport
Application
Rate this question:
LAN
MAN
WAN
WMAN
Rate this question:
Bridge Routers
Gateways
Modems
Cables
Rate this question:
TCP
HTTP
FTP
UDP
Rate this question:
UDP
ICMP
SMTP
SNMP
Rate this question:
Size of network
Cost
Transfer of information
Compatibility
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Information Security Awareness Training Quiz
Information security awareness is a relatively new and evolving part of information security which focus more on raising consciousness regarding potential risks of the rapidly...
Questions:
10 |
Attempts:
2880 |
Last updated:
Mar 22, 2023
|
Revision Topic 1: Introduction To Security
This quiz covers basic concepts of information security, including protection measures, threats, vulnerabilities, and relevant technologies.
Questions:
20 |
Attempts:
255 |
Last updated:
Mar 21, 2023
|
Risk Management Framework Questions!
Explore the Risk Management Framework through targeted questions! Assess your understanding of security assessment, system authorization, and the roles involved in the RMF...
Questions:
30 |
Attempts:
672 |
Last updated:
Nov 16, 2023
|
Mobile Device Security Quiz
The Mobile Device Security Quiz assesses knowledge on safe practices for mobile devices, including secure use of public Wi-Fi, timely updates, and proper handling of corporate...
Questions:
5 |
Attempts:
394 |
Last updated:
Mar 21, 2023
|
SY0-501 - Chapter 1 Mastering Security Basics
The SY0-501 - Chapter 1 Mastering Security Basics quiz assesses key security concepts and practices for deploying applications, preventing equipment theft, maintaining...
Questions:
15 |
Attempts:
321 |
Last updated:
Mar 21, 2023
|
Computer Hardware And Software Startup Functions
Explore key concepts in computer security through a quiz on malware, virus types, and ransomware. Assess your understanding of system protection, identify security breaches, and...
Questions:
10 |
Attempts:
209 |
Last updated:
Mar 20, 2023
|
Wait!
Here's an interesting quiz for you.