
Networking (Basics)
Quiz by Yauhen Arnatovich
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Is TCP protocol a connection (stream) oriented protocol?
truefalseTrue or False30s - Q2
Does UDP establish its connection through the three-way handshake (SYN - SYN+ACK - ACK)?
falsetrueTrue or False30s - Q3
We have a switch which handles 1 network. The switch starts to suffer an ARP storm. Which might be the outcome for the connected devices to this switch?
[Select all that apply, eg, acd]
a) Denial of Service.
b) A man in the middle attack.
c) None. ARP storms do not affect switches, only hubs are affected.
d) None. All network devices are equipped with mitigations for this kind of attacks. (also known as: rejection of unwanted ARP spurious packets)
Users enter free textType an Answer30s - Q4
Is Access Control by MAC address considered a non-bypassable security measure?
True. MAC address is unique for each device and is hardcoded at a chip level, therefore it cannot be tampered with.
False. MAC addresses can be changed at will by an experienced user in certain environments (specific OS).
30s - Q5
Which of the following are true regarding VLAN (802.11q)?
[Select all that apply, eg, acd]
a) VLANs need to be configured with IP addresses
b) VLANs need not have an IP address
c) VLANs do not allow broadcast traffic from one VLAN to another
d) VLANs can be configured on Hubs
Users enter free textType an Answer30s - Q6
Which device improves network performance by dividing a given network segment into separate collision domains?
Hub
Switch
Repeater
Router
30s - Q7
A device designed to filter and transfer IP packets between dissimilar types of computer networks is called a:
Hub
Switch
Proxy
Router
30s - Q8
Does IPv6 enforce the use of a secure connection between the source and the destination?
Yes. IPv6 enforces the use of IPSec. IPSec is hard to configure at a global scale. This is one of the reasons of its slow deployment.
False. Early versions of the standard wanted to enforce the use of secure connections through IPSec. However that requirement was removed in the current version of the standard that rules IPv6.
30s - Q9
The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.
Router
Hub
Bridge
Switch
30s - Q10
Which of the following describes a system that maps domain names to various types of data, such as numerical IP addresses?
SQL
DHCP
DNS
TCP/IP
30s - Q11
What is the name of a network protocol running over SSL/TLS, which is the most suited for secure web browsing?
SNMP
SFTP
FTPS
HTTPS
30s - Q12
Software or hardware that checks information coming from the Internet and either blocks it or allows it to pass through depending on the applied configuration settings is called:
Antivirus
Antispyware
NAC
Firewall
30s