placeholder image to represent content

Networking (Basics)

Quiz by Yauhen Arnatovich

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
12 questions
Show answers
  • Q1

    Is TCP protocol a connection (stream) oriented protocol?

    true
    false
    True or False
    30s
  • Q2

    Does UDP establish its connection through the three-way handshake (SYN - SYN+ACK - ACK)?

    false
    true
    True or False
    30s
  • Q3

    We have a switch which handles 1 network. The switch starts to suffer an ARP storm. Which might be the outcome for the connected devices to this switch?

    [Select all that apply, eg, acd]

    a) Denial of Service.

    b) A man in the middle attack.

    c) None. ARP storms do not affect switches, only hubs are affected.

    d) None. All network devices are equipped with mitigations for this kind of attacks. (also known as: rejection of unwanted ARP spurious packets)

    Users enter free text
    Type an Answer
    30s
  • Q4

    Is Access Control by MAC address considered a non-bypassable security measure?

    True. MAC address is unique for each device and is hardcoded at a chip level, therefore it cannot be tampered with.

    False. MAC addresses can be changed at will by an experienced user in certain environments (specific OS).

    30s
  • Q5

    Which of the following are true regarding VLAN (802.11q)?

    [Select all that apply, eg, acd]

    a) VLANs need to be configured with IP addresses

    b) VLANs need not have an IP address

    c) VLANs do not allow broadcast traffic from one VLAN to another 

    d) VLANs can be configured on Hubs

    Users enter free text
    Type an Answer
    30s
  • Q6

    Which device improves network performance by dividing a given network segment into separate collision domains?

    Hub

    Switch

    Repeater

    Router

    30s
  • Q7

    A device designed to filter and transfer IP packets between dissimilar types of computer networks is called a:

    Hub

    Switch

    Proxy

    Router

    30s
  • Q8

    Does IPv6 enforce the use of a secure connection between the source and the destination?

    Yes. IPv6 enforces the use of IPSec. IPSec is hard to configure at a global scale. This is one of the reasons of its slow deployment.

    False. Early versions of the standard wanted to enforce the use of secure connections through IPSec. However that requirement was removed in the current version of the standard that rules IPv6.

    30s
  • Q9

    The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

    Router

    Hub

    Bridge

    Switch

    30s
  • Q10

    Which of the following describes a system that maps domain names to various types of data, such as numerical IP addresses?

    SQL

    DHCP

    DNS

    TCP/IP

    30s
  • Q11

    What is the name of a network protocol running over SSL/TLS, which is the most suited for secure web browsing?

    SNMP

    SFTP

    FTPS

    HTTPS

    30s
  • Q12

    Software or hardware that checks information coming from the Internet and either blocks it or allows it to pass through depending on the applied configuration settings is called:

    Antivirus

    Antispyware

    NAC

    Firewall

    30s

Teachers give this quiz to your class