This is a network quiz. Choose your answers from the next multiple answer questions.
Pre-configured
Even number
Odd number
On phones
On dial-up systems
On computers
Dial into a network
Dial into a phone
Dial into a computer
Dial a network device to call back
To make calls
To send out signals
On phones
On WAN systems
On routers
Creating Data
Collecting Data
Sending Data
Connection
An automated process
Type of greeting
To connect devices
Connect systems over a communication channel
To connect to networks
Office computers
Home computers
Server computers
The server works on collecting and storing information
The server serves requests from both the client computer operating systems
The server automatically request and saves data
To work wirelessly with the clients computer
To run computers without disks
Taking control of the clients computer and running it from the server
A computer network with a centralized storage server
A computer network that works wirelessly
A computer network that operates on its own
A complicated backup system set up on servers
A simple backup system used to save data
A backup system that collects data from PCs and saves it
To collect and save all data from systems and store it in servers
To copy only new data from a system and store it in the server
To copy and delete all the unwanted data from systems
Connect systems over a communication channel
The type of device you are backing up you files to
Names of the devices you are backing up the files on
To use them to back up you files safely do that they are not lost
Help you to decide which files should be backed up
Used to update data that has beed backed up
Files that are used to store unwanted data from the database
Files that are used to store access data from the database
Audit logs are files containing a summary of major changes in the database
To alert the users of any deleted information within the database
To keep all the information on any new major updates that have taken place within a database
To update the users of changes within the database
Virtual protection network
Visual preventing network
A virtual private network
Uses the Internet to provide remote offices with secure access to their organization's network
Help to connect long distance wireless networks
Connects the internet to local areas
Alerting the user when there are intruders
Intruder detection is the art of detecting intruders behind attacks
Detecting thieves
To stop thieves from stealing your goods.
To stop thieves from entering you house
Intruder detection tries to identify the person behind an attack by analyzing their computational behaviour
Having a password that is strong
Creating a password with 8 characters with at least 1 number in both upper & lowercase
Creating a password to stop people from using your PC
To make you password more secure so that it will be harder to hard or decrypt for hackers
To protect computers from hackers
To help you to stop hacking on your computer
To show the user if their password is long enough
The strengths of your password is measured as Weak, Medium or Strong
To help the user to choose the Wright type of password
Wait!
Here's an interesting quiz for you.