Which network environment is private and used only within an organisation?, Internet, Extranet, Intranet, WAN, Which network environment allows authorised external users, such as business partners, to access internal systems?, Internet, Extranet, Intranet, LAN, Which network type typically covers 10 m – 1 km within a building and uses cables?, WAN, WLAN, LAN, Internet, Which network type is commonly used in cafes, airports, and schools?, LAN, WAN, WLAN, Intranet, Which factor mainly differentiates LAN, WLAN, and WAN?, User permission, Coverage range and connection method, Cost of installation, Type of operating system, What is the main function of a Network Interface Card (NIC)?, Store data packets, Convert binary data into electrical signals, Route data between networks, Assign IP addresses, Which address is fixed, unique, and embedded in the NIC?, IP address, URL, MAC address, DNS address, Which device broadcasts data packets to all connected devices, reducing security?, Switch, Router, Bridge, Hub, Which device uses a MAC address table to send data only to the correct device?, Hub, Switch, Bridge, Modem, Which device connects a LAN to the Internet and uses a routing table?, Switch, Hub, Router, Bridge, A physical token is best described as:, A password stored in software, A physical object used for authentication, A biometric scan, A firewall, Which physical token requires the user to manually key in a code?, Connected physical token, Electronic token, Disconnected physical token, Software token, An electronic token is usually installed on a:, Router, Server, Smartphone, Printer, What is the main function of an electronic token?, Encrypt files, Generate a one-time password, Detect malware, Assign IP addresses, Why is heuristic checking used in anti-malware software?, To speed up internet access, To detect unknown viruses by behaviour, To encrypt data, To remove hardware faults, Which type of conferencing combines audio and video in real time?, Audio conferencing, Web conferencing, Video conferencing, Text conferencing, Which hardware is essential for video conferencing?, Printer, Webcam, Scanner, Barcode reader, Which is an advantage of video conferencing?, Requires no training, Always high image quality, Reduces travel and pollution, No internet needed, In audio conferencing, participants join the meeting by using a:, Username, MAC address, PIN, IP address, Which feature allows participants in web conferencing to type messages during the meeting?, Screen casting, Instant messaging, File compression, Packet switching, Which network environment is open to the public worldwide?, Intranet, Extranet, Internet, LAN, Which network environment is mainly used for internal staff communication?, Internet, Extranet, Intranet, WAN, Which network type normally requires an Access Point (AP)?, LAN, WLAN, WAN, Intranet, Which network type usually connects different cities or countries?, LAN, WLAN, WAN, Intranet, Which network type uses radio or infrared signals?, LAN, WAN, WLAN, Extranet, Which component allows a computer to connect to a network?, CPU, NIC, Router, Switch, Which address is also known as a physical address?, IP address, URL, MAC address, Domain name, Which address can change when a device connects to a different network?, MAC address, IP address, Serial number, NIC number, What is the basic unit of data transmission in a network?, Frame, File, Data packet, Signal, Which device sends data packets to all devices, even if they are not the receiver?, Switch, Hub, Router, Bridge, Which device is considered a more intelligent hub?, Bridge, Router, Switch, Modem, Which device uses IP addresses to decide where to send data?, Hub, Switch, Router, NIC, Which authentication method proves “something you have”?, Password, Physical token, Biometric scan, Username, Which token sends a one-time password automatically via USB?, Disconnected physical token, Electronic token, Connected physical token, Software password, Which token requires a separate device with a keypad?, Electronic token, Connected physical token, Disconnected physical token, Biometric token, Which software helps protect a computer from viruses and malware?, Firewall, Anti-virus software, Compiler, Operating system, What happens to suspicious files detected by anti-malware software?, Immediately deleted, Sent to the internet, Put into quarantine, Ignored, A switch is mainly used to:, Connect a LAN to the Internet, Store data packets, Connect devices in a LAN, Convert signals, Which device is often described as an “intelligent hub”?, Router, Switch, Bridge, Modem, A switch sends data packets to:, All connected devices, Only the correct destination device, The Internet, All nearby networks, Which address does a switch use to forward data correctly?, IP address, URL, MAC address, Domain name, A switch stores MAC addresses in a:, Routing table, Lookup table, Database server, Cache memory, Why is a switch more secure than a hub?, It uses passwords, It blocks the Internet, It sends data only to the intended device, It encrypts all data, Which device reduces unnecessary network traffic?, Hub, Switch, Bridge, Repeater, Which situation is MOST suitable for using a switch?, Connecting two countries, Connecting devices in an office LAN, Wireless communication between phones, Internet service provider network, What happens if a switch receives a data packet with an unknown MAC address?, It deletes the packet, It sends the packet to the Internet, It broadcasts the packet to all ports, It shuts down, Which statement about a switch is TRUE?, It uses IP addresses only, It broadcasts data to all devices, It improves network efficiency, It cannot be used in LAN, Wi-Fi is mainly used to:, Connect devices using cables, Transmit data wirelessly at high speed, Store data permanently, Encrypt passwords, Which place commonly provides Wi-Fi hotspots?, Printer room, Cafe, Hard disk, Keyboard, Which device allows Wi-Fi access to the internet?, Scanner, Access Point (AP), Smart card, Hub, Wi-Fi mainly uses which type of signal to transmit data?, Light waves, Electrical cables, Electromagnetic radiation, Sound waves, Bluetooth is best described as:, Long-range, high-power networking, Short-range, low-power wireless communication, Wired communication technology, Satellite communication, Bluetooth is commonly used for:, Connecting cities, Connecting headphones to phones, Storing cloud data, Email servers, Bluetooth operates around which frequency?, 900 MHz, 1 GHz, 2.45 GHz, 5 GHz, Why do Bluetooth devices change channels frequently?, To increase speed, To reduce power usage, To avoid interference, To store data, Which technology has a longer range?, Bluetooth, Wi-Fi, Infrared, NFC, Which technology supports more connected devices at one time?, Bluetooth, Wi-Fi, USB, Infrared, Cloud computing stores data on:, Local hard disks only, USB drives, Remote servers, RAM, Storing the same data on multiple cloud servers is called:, Encryption, Compression, Data redundancy, Data mining, Which cloud type is shared between different companies?, Private cloud, Hybrid cloud, Public cloud, Local cloud, Which is an advantage of cloud storage?, Needs no internet, Unlimited free storage, Access from anywhere, No security risk, Which is a disadvantage of cloud computing?, Data cannot be backed up, Requires internet connection, Data cannot be shared, Limited storage size, Passwords are commonly used when:, Printing documents, Accessing email accounts, Charging devices, Scanning images, A strong password should include:, Only letters, Only numbers, Letters, numbers, and symbols, Username only, Why should passwords be changed regularly?, To improve internet speed, To reduce hacking risk, To save storage, To avoid updates, Zero login allows users to login without:, Internet, Devices, Passwords, Electricity, Zero login mainly uses:, Usernames, Biometrics and behaviour, Magnetic cards, PIN numbers, Which is an example of biometric data?, Password, PIN, Fingerprint, Username, Magnetic stripe cards store data as:, Sound waves, Binary values (0 and 1), Images, Letters, Which is a disadvantage of magnetic stripe cards?, Easy to use, Cheap technology, Wear out over time, Can be deactivated, Magnetic stripe cards are less secure than:, Passwords, Smart cards, USB drives, Email, Smart cards contain:, Only plastic, A chip and antenna, A magnetic stripe only, A barcode, Smart cards can be read:, Only by swiping, From a distance (contactless), Only using keyboard, Only online, After scanning a smart card, the user is usually required to enter:, username, password, PIN, Email, Which feature allows participants to draw or write during a web conference?, Webcam, Whiteboard, Instant messaging, Screen lock.
0%
Hello Network!
Share
Share
Share
by
U24580011
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Quiz
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
)
Open results
Copy link
QR code
Delete
Continue editing:
?