0% found this document useful (0 votes)
15 views32 pages

$RHBYGY8

ggg

Uploaded by

meromero120201
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views32 pages

$RHBYGY8

ggg

Uploaded by

meromero120201
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Networking Fundamentals

Your Name:

1. What is the primary function of a NIC (Network


Interface Card)?

A. To provide power to a network

B. To translate a Mac address to an IP address

C. To enable a device to directly access a network

D. To assign an IP address to a device

2. What type of address is burned onto a NIC card?

A. IP address

B. Logical address

C. Physical address

D. Mac address

3. What is the purpose of protocols in a network?

A. To establish communication rules between devices

B. To connect devices to a network

C. To assign IP addresses to devices

D. To provide security to a network


4. What type of NIC is plugged directly into a
motherboard?

A. Wireless NIC

B. Internal NIC

C. USB-based NIC

D. External NIC

5. What is an example of a protocol?

A. Network adapter

B. HTTP

C. IP address

D. Mac address

6. What is a primary function of computer networks?

A. To provide a platform for standalone computers

B. To connect devices through a single medium

C. To process information independently

D. To share resources and perform certain tasks

7. What type of resource can be shared in a computer


network?

A. Only hardware devices

B. Only software applications

C. Files, devices, and software with multi-user licenses

D. Only internet access


8. What is the purpose of a router in a computer network?

A. To store files and data

B. To connect devices through a wireless medium

C. To connect devices through a wired medium

D. To direct traffic between devices on the network

9. What type of information travels over the network


medium?

A. Messages, such as emails, WhatsApp, and files

B. Only voice and video calls

C. Only emails and files

D. Only software updates

10. What governs the flow of messages across a network?

A. Network devices

B. Network software

C. Network hardware

D. Network protocols
Untitled Quiz

Your Name:

1. What is a type of hardware that enables a device to


directly access the network?

A. Router

B. Hub

C. NIC (Network Interface Card}/network adapter or LAN adapter

D. Switches

2. What is the primary function of a switch in a network?

A. To provide high-speed internet access

B. To connect devices to the internet

C. To connect different networks

D. To allow different nodes to communicate with each other

3. What is the main difference between a LAN and a WAN?

A. LAN is faster, WAN is slower

B. LAN is for homes, WAN is for businesses

C. LAN is under administrative control, WAN is not

D. LAN is smaller, WAN is larger


4. What is the purpose of protocols in a network?

A. To provide internet access

B. To connect devices to a switch

C. To provide network security

D. To enable data to flow from one node to another

5. What is the OSI reference model?

A. A type of network topology

B. A model for developing universal network protocols

C. A protocol suite developed by Microsoft

D. A standard protocol for internet communication

6. What is the primary advantage of the TCP/IP protocol?

A. It is only used for internet communication

B. It is a proprietary protocol

C. It is a type of network topology

D. It is open-standard and cross-platform

7. What is the main difference between TCP/IP and OSI


models?

A. TCP/IP is a reference model, OSI is a protocol suite

B. TCP/IP is a proprietary protocol, OSI is an open-standard protocol

C. TCP/IP is a protocol suite, OSI is a reference model

D. TCP/IP is used for internet communication, OSI is used for local


networks
8. What is the current version of the TCP/IP protocol used
in the internet?

A. TCP/IP v6

B. TCP/IP v5

C. TCP/IP v4

D. TCP/IP v3
Computer Network Layers

Your Name:

1. What is the primary function of the Network Access


Layer?

A. Defining the electrical and mechanical aspects of transmission

B. Routing of data between hosts

C. Error notification and hop-to-hop addressing

D. Providing a logical interface between the end system and network

2. What is the purpose of the IP Layer?

A. Providing a logical interface between the end system and network

B. Defining the electrical and mechanical aspects of transmission

C. Providing connectivity and path selection between two hosts

D. Error notification and hop-to-hop addressing

3. What is the purpose of ICMP (Ping)?

A. Assigning IP addresses to devices

B. Defining the electrical and mechanical aspects of transmission

C. Testing connectivity between hosts

D. Providing a logical interface between the end system and network


4. How many bits are in an IPv4 address?

A. 48

B. 16

C. 128

D. 32

5. What is the purpose of a Physical Address (MAC


address)?

A. Identifying devices at the data link layer

B. Defining the electrical and mechanical aspects of transmission

C. Routing data between hosts

D. Providing a logical interface between the end system and network

6. What are the three ways to assign an IP address to a


device?

A. Manual, DHCP, and ARP

B. Manual, DNS, and FTP

C. Manual, HTTP, and FTP

D. Manual, Automatic, and APIPA

7. What is the maximum number of possible IPv6


addresses?

A. 340 trillion

B. 340 undecillion

C. 340 billion

D. 340 gazillion
8. What is the command to find your private IP?

A. Ipconfig /release

B. Ipconfig /all

C. GetMac

D. Ipconfig
Computer Networking and Remote Access

Your Name:

1. What is the purpose of the SMTP protocol?

A. To send messages between mail servers or email clients

B. To connect devices to the existing internet infrastructure

C. To collect email messages from a mail server

D. To retrieve only message headers

2. Which mail protocol is used to download messages on


the hard disk and keep the user's quota on the server?

A. IMAP4

B. RDP

C. SMTP

D. POP3

3. What is the main aim of the Internet of Things (IOT)?

A. To enable remote connections to other computers

B. To send messages between mail servers or email clients

C. To connect all devices to the existing internet infrastructure

D. To retrieve only message headers


4. What is the function of a Mail Server?

A. To send messages between mail servers or email clients

B. To collect email messages from a mail server

C. To connect devices to the existing internet infrastructure

D. To store and manage email messages

5. What is the protocol used by Microsoft for remote


connections to other computers?

A. Telnet/SSH

B. RDP

C. SMTP

D. POP3

6. Which of the following is NOT a practical application of


IOT?

A. Smart Homes

B. Email management

C. Healthcare management

D. Energy management

7. What is the primary function of the Transport Layer in


the OSI model?

A. To assign and control port numbers

B. To translate human-readable names into IP addresses

C. To support the delivery of web pages to the client

D. To provide communication between processes or applications


8. Which of the following port number ranges is assigned
and controlled by ICANN?

A. 49,152 to 65,535

B. 65,536 to 80,000

C. 0 to 1,023

D. 1,024 to 49,151

9. What is the primary purpose of the Application Layer in


the OSI model?

A. To provide reliable data transfer between hosts

B. To translate human-readable names into IP addresses

C. To assign and control port numbers

D. To communicate between processes or applications

10. What is the protocol used for transmitting web pages


to the client?

A. HTTP

B. FTP

C. SMTP

D. DNS

11. What is the purpose of DNS (Domain Name Servers)?

A. To communicate between processes or applications

B. To translate human-readable names into IP addresses

C. To assign and control port numbers

D. To provide reliable data transfer between hosts


12. What is the purpose of FTP (File Transfer Protocol)?

A. To provide communication between processes or applications

B. To translate human-readable names into IP addresses

C. To support the delivery of web pages to the client

D. To provide reliable data transfer between hosts

13. What is the protocol used for accessing remote


computers?

A. Telnet/SSH

B. FTP

C. HTTP

D. DNS

14. What is the purpose of a URL?

A. To assign and control port numbers

B. To provide reliable data transfer between hosts

C. To translate human-readable names into IP addresses

D. To identify the location of a resource on a network


Computer Networks Elements

Your Name:

1. What type of address is unique to each device on a


network?

A. MAC address

B. HTTP address

C. URL

D. IP address

2. What is the purpose of a repeater in a network?

A. To connect different networks together

B. To connect devices to a wired network

C. To allow devices to communicate at the same time

D. To regenerate the signal before it becomes too weak

3. What is the primary function of a router?

A. To allow devices to communicate at the same time

B. To connect different networks together

C. To regenerate the signal over a network

D. To connect different nodes in the same network


4. What is the characteristic of a Wide Area Network
(WAN)?

A. A group of computers connected via wired connections

B. A small geographical area, such as a school

C. A large geographical area, such as a country

D. A group of computers connected via wireless

5. What is the purpose of a switch in a network?

A. To allow devices to communicate at the same time

B. To connect different nodes in the same network

C. To connect different networks together

D. To regenerate the signal over a network

6. What is an Access Point (AP) in a network?

A. A device that regenerates the signal over a network

B. A physical location where Wi-Fi access is available

C. A device that connects devices to a wired network

D. A device that connects different networks together

7. What is the primary function of a Network Interface


Card (NIC)?

A. To enable a device to directly access a network

B. To allow devices to communicate with each other

C. To connect different networks together

D. To regenerate the signal over a network


8. What is the characteristic of a Local Area Network
(LAN)?

A. A group of computers connected in a large geographical area

B. A group of computers connected in a small geographical area

C. A group of devices connected via wired connections

D. A group of devices connected via wireless

9. Who owns the Internet?

A. IETF (Internet Engineering Task Force)

B. One single organization

C. ISOC (Internet Society)

D. Many organizations, ISPs, companies, and governments

10. What is a characteristic of a Peer-to-Peer network?

A. Some nodes are dedicated to providing services

B. Dedicated servers provide services to clients

C. All nodes are equal and use resources equally

D. Nodes are connected in a hierarchical structure

11. What is the purpose of protocols in computer


networks?

A. To enable efficient communication between devices

B. To provide internet access

C. To manage network resources

D. To provide security to the network


12. What is the OSI Reference Model used for?

A. To optimize network performance

B. To provide universal concepts for protocol development

C. To develop the Internet

D. To manage network devices

13. What is TCP/IP?

A. A type of network cable

B. A network device

C. A network architecture model

D. A network protocol suite

14. What is the main difference between TCP/IP and OSI


models?

A. TCP/IP is a protocol suite, OSI is a reference model

B. TCP/IP is used for LANs, OSI is used for WANs

C. OSI is a protocol suite, TCP/IP is a reference model

D. TCP/IP is used for WANs, OSI is used for LANs

15. What is the function of the Physical Layer in the OSI


model?

A. Defines electrical, mechanical, and transmission medium

B. Hop-to-hop addressing and error notification

C. Error detection and correction

D. Logical interface between end systems and networks


16. What is the next version of TCP/IP?

A. TCP/IP v3

B. TCP/IP v7

C. TCP/IP v5

D. TCP/IP v6
Hacking Phases and Techniques

Your Name:

1. What is the primary goal of the reconnaissance phase in


an attack?

A. To gather information about the target

B. To maintain access to the system

C. To exploit the system

D. To scan the network for open ports

2. What type of attack involves modifying the source


address of packets to bypass firewall rules?

A. Buffer overflow attack

B. Spoof attack

C. HiJack attack

D. Phishing attack

3. What is the term for the ability to influence the


behavior of a group of people?

A. Social engineering

B. Spoofing

C. HiJacking

D. Phishing
4. What type of attack involves sending more data to an
application than is expected?

A. Buffer overflow attack

B. Phishing attack

C. HiJack attack

D. Spoof attack

5. Which type of attack involves creating a fake web page


to persuade users to enter sensitive information?

A. Phishing attack

B. HiJack attack

C. Buffer overflow attack

D. Spoof attack

6. What type of attack involves taking over a session


between two individuals?

A. HiJack attack

B. Buffer overflow attack

C. Phishing attack

D. Spoof attack

7. Who is typically involved in an insider attack?

A. A hacker from the outside

B. A disgruntled employee

C. A network engineer

D. A system administrator
8. What is the goal of the maintaining access phase in an
attack?

A. To retain ownership of the system

B. To exploit the system

C. To scan the network for open ports

D. To cover tracks

9. What is the goal of a password attack?

A. To spread a virus or worm

B. To launch a denial of service attack

C. To install a backdoor or Trojan Horse

D. To gain administrative access to the system

10. What is a Trojan Horse?

A. A program with hidden side-effects, allowing indirect access

B. A type of backdoor or secret entry point

C. A type of denial of service attack

D. A type of virus that replicates itself

11. What is the primary goal of a ransomware attack?

A. To launch a distributed denial of service attack

B. To crash the system and consume resources

C. To gain administrative access and install a backdoor

D. To lock or encrypt data, demanding a ransom in return


12. What is a zombie in the context of cyber security?

A. A type of denial of service attack

B. A type of virus or worm

C. A program that secretly takes over another networked computer

D. A type of Trojan Horse or backdoor

13. What is the primary difference between a virus and a


worm?

A. A worm is a type of Trojan Horse

B. A worm is a type of virus

C. A virus replicates itself, while a worm does not

D. A virus requires user interaction, while a worm does not

14. What is the goal of a denial of service (DoS) attack?

A. To crash the system and consume resources

B. To spread a virus or worm

C. To launch a ransomware attack

D. To gain administrative access to the system

15. What is a common use of zombie computers?

A. To launch a distributed denial of service attack

B. To spread a virus or worm

C. To gain administrative access to the system

D. To launch a ransomware attack


16. What is a major issue with permanently connected
systems?

A. Lack of security against viruses and worms

B. Lack of security against denial of service attacks

C. Lack of security against ransomware attacks

D. Lack of security against permanently connected systems


Computer Security Threats

Your Name:

1. What is the term used to describe an individual or


organization responsible for sending spam?

A. Spyware

B. Spammer

C. Phisher

D. Hacker

2. What is the primary function of a Firewall?

A. To control the traffic between networks and prevent unauthorized


access

B. To intercept internal user requests and process them on behalf of


the user
C. To block all incoming and outgoing internet traffic

D. To tunnel traffic between two sides of a network

3. What type of threat can overload ISPs, email servers,


and individual end-user systems?

A. Spam

B. Spyware

C. Viruses

D. Trojan Horses
4. What is the term used to describe a program that
gathers personal information from a computer without
permission?

A. Trojan Horse

B. Spyware

C. Worm

D. Virus

5. What is the primary function of a Proxy Server?

A. To filter out specific types of attacks

B. To watch network traffic and detect intrusions

C. To tunnel traffic between two sides of a network

D. To intercept internal user requests and process them on behalf of


the user

6. What is the term used to describe a system that


watches network traffic and detects intrusions?

A. NIDS

B. Firewall

C. Proxy Server

D. VPN

7. What is the term used to describe a secure network


connection between two endpoints?

A. VPN

B. NIDS

C. Proxy Server

D. Firewall
8. What is the type of firewall that prevents or allows
access based on IP or MAC addresses?

A. Dynamic Packet Filtering

B. SPI

C. Stateful Packet Filtering

D. Static Packet Filtering

9. What is the primary function of a NIPS?

A. To stop traffic in case of an intrusion

B. To create a baseline of normal traffic

C. To monitor network traffic

D. To encrypt data transmissions

10. What type of firewall is described as a 'deep-packet


inspection firewall'?

A. Next-generation Firewall (NGFW)

B. Stateful firewall

C. Packet-filtering firewall

D. Traditional firewall

11. What is the main purpose of digital signatures?

A. To authenticate the sender's identity

B. To provide confidentiality

C. To encrypt data transmissions

D. To ensure non-repudiation and integrity


12. What is the role of a certification authority in digital
certificates?

A. To issue digital certificates to websites

B. To manage digital signatures

C. To verify the authenticity of digital certificates

D. To generate public and private keys

13. What is the process of converting plaintext into


ciphertext?

A. Digital signing

B. Hashing

C. Decryption

D. Encryption

14. What is the primary purpose of a digital certificate?

A. To verify the integrity of a document

B. To enable digital signatures

C. To authenticate the identity of a website

D. To provide encryption

15. What type of encryption algorithm uses the same key


for both encryption and decryption?

A. Asymmetric encryption

B. Symmetric encryption

C. Hash-based encryption

D. Public-key encryption
16. What is the main advantage of using a NGFW over a
traditional firewall?

A. Increased speed

B. Lower cost

C. Reduced complexity

D. Improved security
Information Security Fundamentals

Your Name:

1. What is the primary goal of confidentiality in


information security?

A. Ensuring that information is not revealed to unauthorized persons

B. Denying access to information and resources

C. Detecting any modification of data

D. Ensuring that data is accessible to all users

2. What is the formula to calculate risk in information


security?

A. Risk = Threat x Vulnerabilities

B. Risk = Threat ÷ Vulnerabilities

C. Risk = Threat + Vulnerabilities

D. Risk = Threat - Vulnerabilities

3. What is the primary purpose of a firewall in information


security?

A. To encrypt data transmission

B. To control incoming and outgoing network traffic

C. To provide virtual private network access

D. To detect and prevent malware attacks


4. What is the key difference between symmetric and
asymmetric key cryptography?

A. Symmetric key is used for encryption, while asymmetric key is used


for decryption

B. Asymmetric key is used for encryption, while symmetric key is used


for decryption
C. Asymmetric key uses two keys, while symmetric key uses one key

D. Symmetric key uses two keys, while asymmetric key uses one key

5. What is the primary focus of security in information


security?

A. Implementing firewalls

B. Risk

C. Encrypting data

D. Preventing cyber attacks

6. What is the reason why it's impossible to totally


eliminate risk in information security?

A. Because users are not aware of security risks

B. Because it's difficult to identify all vulnerabilities

C. Because there are too many types of attacks

D. Because there is no simple solution to securing information

7. What is an example of a passive attack?

A. An attacker scanning the network for open ports

B. An attacker hijacking a session between two individuals

C. An attacker launching a phishing attack

D. An attacker capturing packets from the network and attempting to


decrypt them
8. What is the primary goal of a reconnaissance attack?

A. To hijack a session between two individuals

B. To gather as much information as possible about a target

C. To launch a phishing attack

D. To gain unauthorized access to a system

9. What is the term for the ability of someone or


something to influence the behavior of a group of people?

A. Reconnaissance

B. Phishing

C. Hijacking

D. Social engineering

10. What type of attack involves someone from the inside,


such as a disgruntled employee, attacking the network?

A. Hijacking attack

B. Phishing attack

C. Insider attack

D. Reconnaissance attack

11. What is the term for a fake web page that looks
exactly like a popular website, used to persuade users to
enter sensitive information?

A. Hijacking attack

B. Reconnaissance attack

C. Phishing attack

D. Insider attack
12. What is the term for a hacker taking over a session
between two individuals and disconnecting the other
individual from the communication?

A. Insider attack

B. Phishing attack

C. Hijacking attack

D. Reconnaissance attack

13. What is the primary goal of a scanning attack?

A. To exploit vulnerabilities in the system

B. To gather as much information as possible about a target

C. To hijack a session between two individuals

D. To scan the network with specific information gathered during


reconnaissance

14. What is the term for activities undertaken by a hacker


to extend their misuse of the system without being
detected?

A. Covering tracks

B. Maintaining access

C. Reconnaissance

D. Gaining access

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy