You are on page 1of 3

Republic of the Philippines

Department of Education
Western Visayas
Division of Sagay City

GLORIA POBLADOR DELA PAZ NATIONAL HIGH SCHOOL


Senior High School Program
S.Y. 2020-2021

COMPUTER SYSTEM SERVICING 11


THIRD SUMMATIVE TEST

Objectives:
At the end of the test, students are expected to:
1. Read the instructions carefully and legibly answer the examination.
2. Display good disposition upon answering the examination.

TABLE OF SPECIFICATION
Cognitive Domain No. of
Items
Learning Competencies
Understanding
Remembering

Evaluating
Analyzing
Applying

Creating
Configure wireless settings in accordance Part I
(7,9,10
with manufacturer’s instructions, network
design, and end-user preferences.
TLE_IACSS9-12SUCN-If-j-IIa-e-35
Configure security/ firewall/advanced
Part I. (11, Part I. 15
settings in accordance with 12) (13, 14,
manufacturers instruction and end-user 15)
preferences . Part II.
1-10
TLE_IACSS9-12SUCN-If-j-IIa-e-35
TOTAL No. of ITEMS 25

Prepared by:

YOLANDA C. RENOS, CoE, LPT


Subject Teacher
Checked and Approved by:

CATHERINE L. JUANICO, LPT


Teacher-In-charge

Republic of the Philippines


Department of Education
Western Visayas
Division of Sagay City

GLORIA POBLADOR DELA PAZ NATIONAL HIGH SCHOOL


Senior High School Program
S.Y. 2020 - 2021

Computer Systems Servicing 11


Summative Test 1

Name: ___________________________________ Grade Level & Section: ____________________

General Directions: Read the instructions carefully and answer it legibly. (Use the answer sheet provided to
you.)

Part I. Multiple Choice: Choose the letter of the correct answer. Write your answer beside the number.

1. Which of the following network that uses radio waves to connect devices such as laptops and mobile
phones to the Internet and to your business networks for its applications.?
a. Wired Internet Network c. Wireless LAN Network
b. Wired LAN Network d. All of the above.
2. This is a type of network that allows devices to stay connected to the network but roam untethered to
any wires.
a. Wired Network c. Wirelles Network
b. Mesh Network d. Host Network
3. The following are the benefits of a wireless network EXCEPT
a. Easy Set-up b. Vulnerability c. Mobility d. Cost
4. Which of the following devices are NOT common in a Client Network?
a. Phones b. Computer c. Tablets d. Sector
5. What type of devices are used in Mesh Network?
a. Ad-hoc b. Sector c. Hub d. UTP
6. Which of the following figure below that indicates Clients cannot connect to each other wirellessly?

a. c.

b. d.

7. It is a router that send and receive wireless signals in every direction.


a. Sector b. Omnidirectional c. Focused d. Antenna
8. What type of device it is that converts electrical signals to radio waves?
a.Sector b. Omnidirectional c. Focused d. Antenna
9. It refers to an individual device in a mesh network.
a. Node b. Connection c. Part d. None of these
10. It is a device that allows wireless devices to connect to a wired network using Wi-Fi or related
standards.
a. Ad-hoc b. Access Point c. Client d. Node
11. It is define as any method used to maliciously attempt to compromise network security.
a. Network Attack c. Maliciously Attack
b. Unauthorized Attack d. Unstructured Attack
12. A type of attack that a network exploit in which attacker attempts to make changes to data on
the target or data en route to the target.
a. Active Attack c. Unstructured Attack
b. Passive Attack d. Structured Attack
13. What type of network security it is when it uses a set of defined rules to allow or block traffic?
a. Access control b. Firewalls c. VPN d. Application Security
14. It is a type of network security where it encrypts the connection from an endpoint to a network,
often over the Internet.
a. Access control b. Firewalls c. VPN d. Application Security
15. If you want to identify activities that deviate from the norm, what type of network security will
you used?
a. VPN b. Behavioral analytics c. Firewall d. Application Security

Part II. TRUE OR FALSE: Write the word TRUE in the space provider if the statements are correct and
FALSE if it is not.

________1. A firewall is hardware or software that can help protect your PC from unauthorized users or
malicious software (malware).
________2. Running a firewall on each PC on your network won't help control the spread of malicious
software on your network.
________3. In order to provide the security you need, the Windows Firewall has a standard set of inbound
and outbound rules.
________4. These rules can't be configured so that they are specific
to: computers, users, programs, services, ports or protocols.
________5. In the Windows Firewall with Advanced Security, you can access all rules and edit their
properties.
________6. Connection security rules are used to secure traffic between two computers while it crosses the
network.
________7. Monitoring section shows only the active rules for the current network location.
________8. Unlike the inbound or outbound rules, which are applied only to one computer, connection
security rules require that both computers have the same rules defined and enabled.
________9.Windows Firewall with Advanced Security is a tool which gives you detailed control over the
rules that are applied by the Windows Firewall.
________10. Inbound rules are applied to the traffic that is coming from the network and the Internet to your
computer or device.

You might also like