No student devices needed. Know more
33 questions
What does ‘things’ in ‘Internet of Things’ refers to?
Any everyday device
Any Internet-enabled everyday device
Any Bluetooth-enabled everyday device
None of the above
What was the name of the first iteration of the Internet, developed by the US Government's Advanced Research Projects Agency in the 1960s?
What is the technology that was invented by Tim Berners Lee in 1989?
What does DNS stand for?
This statement describes what - "A service which leases out IP Addresses to devices on the network"
NAT
DHCP
Port Forwarding
Host Identifier
This statement describes what - "A service which changes the Source/Destination IP address headers in packets to allow them to travel across multiple networks"
NAT
DHCP
Port Forwarding
Host Identifier
What Does NAT Stand For?
Network Aid Trust
Network Address Translation
Network Aid Translation
Network Address Transportation
A Router has a Private IP Address of 192.168.1.1 and a public IP Address of 102.233.204.2 - what IP Address will it put into the Source IP Header for packets going out of the private network onto the internet?
192.168.1.1
102.233.204.2
Neither
Del Boy
A Network Computer has an IP Address of 10.16.127.8 and a subnet mask of 255.255.255.0. what is the "network" portion of this IP Address?
10.16.
10.16.127.8
10.
10.16.127.
A Network Computer has an IP Address of 10.16.127.8 and a subnet mask of 255.255.255.0. What is the "host" portion of this IP Address?
del boy
8
10.
10.16.127.8
What does LAN stand for?
Local Arena Network
Local Area Network
Logical Area Network
Local Area Networking
Which of these devices is used to connect to an external network?
Switch
Firewall
Router
Server
Which of the below is the most suitable topology for a national company with multiple sites?
Star
Mesh
Ring
Bus
What of these best describes the internet?
A collection of web pages
A Network of Networks
An Internal Network
This Statement describes what - "a mode of data transmission in which a message is broken into a number of parts which are sent independently"
NAT
DHCP
Port Forwarding
Packet Switching
What is hacking?
Hacking is the process of installing malicious software on a computer system.
Hacking is the response to having a terribly sore throat.
Hacking is unauthorised access to a computer or computer network.
Hacking is a positive test for a networked computer system.
Other than passwords, how else can access be restricted to a computer network?
Biometrics could be used to identify a user.
Using a doorbell will prevent intruders from entering unnoticed.
Accounts can be suspended on certain days or for certain times.
Physical swipecards could be used.
Two factor authentication could be used - This may require not only a password but a second way of authenticating a users identification; mobile number, authentication app for example.
Firewalls; What are they and how do they work? Select all which apply.
A firewall controls traffic into and out of a network. It is effectively a barrier between the network and external traffic.
A firewall can often include a proxy server. This makes requests to the internet on behalf of the network computers.
A firewall makes it impossible to infiltrate a computer network.
Firewalls use an access control list (ACL) that uses a technique called packet filtering. An ACL controls which packets can travel through the firewall.
Which of the following statements describes characteristics of the IP protocol?
Operates without a dedicated end-to-end connection and uses best effort in delivering packets.
Detects and retransmits packets if errors occur.
Re-assembles out of order packets into the correct order at the receiver end.
Guarantees delivery of packets to the destination network.
When a connectionless IP protocol is in use in the layer model, how are dropped packets detected and retransmitted?
Connectionless acknowledgements are used to request retransmission.
A Transport layer connection-oriented protocol keeps track of the data received and can request retransmission from the sending host.
Network layer IP protocols manage the communication sessions if connection-oriented transport services are not available.
The best-effort delivery process guarantees that all packets that are sent are received.
What statement describes an advantage that IPv6 offers over IPv4?
IPv6 has a smaller-sized header.
Checksums in the trailer have been enhanced in IPv6.
Source and destination IP addresses are smaller in IPv6.
IPv6 eliminates the need for NAT since every device can keep a unique global IP address.
Which field is used to detect corruption in the IPv4 header?
Header Checksum
Time to Live
Protocol
Differentiated Services
When a router receives a packet, what information must be examined in order for the packet to be forwarded to a remote destination?
Source IP address
Destination IP address
Source MAC address
Destination MAC address
A gateway is ..
device that connects two lans
single communication path during data transmission
a device that connects two different types of networks
devices that prevents unauthorized access to the network
The _______ provides your computer with a service (e.g. accessing websites, loading emails) in a client-server relationship
Client
Server
Protocols
define rules that ensure data is transmitted between devices correctly
provide WiFi which increases convenience and mobility
increase your network bandwidth so information arrives faster
create data redundancy and greater reliability of network services
Protocol that sends requests to a web server
FTP
IMAP
TCP/IP
HTTP
Denial of service attack..
Denies access rights to unauthorized users
Refers to a security breach in your installation
Involves receiving more requests that the system can handle
Impersonates users to break in
Two organizations cannot use the same IP address for a computer on their network.
true
false
Explore all questions with a free account