You are on page 1of 10

Started on Tuesday, 22 September 2020, 11:33 AM

State Finished
Completed on Tuesday, 22 September 2020, 11:43 AM
Time taken 9 mins 42 secs
Marks 20.00/20.00
Grade 100.00 out of 100.00
Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Data Link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is the term used to describe an individual’s anonymity and how safe they feel in a website
location.
Select one:
a. Software Update
b. Defragmentation
c. Computer Privacy
d. Disk Cleanup
Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Firewall is the process of converting a data or information into another form also known as
cipher text.

Select one:
True
False

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Transport
Answer Layer ensures that message are delivered error-free in sequence and
with no losses or duplications.

Question 5
Complete
Mark 1.00 out of 1.00
Flag question

Question text

It is a server that is used by IP Networks to dynamically distribute network configuration


parameters like IP address for interface and services.
Select one:
a. Firewall
b. DNS Server
c. Router
d. DHCP Server

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.

Physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Choose True if the Statement is True and False if the statement is False.

Honey Pot is a software application that scans your whole computer’s hard drives and
folders for possible malware or virus infections.

Select one:
True
False

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text

A Type of Network that is being utilized nowadays by individuals for their homes and
apartments. This network allows all users to connect and share resources.

Select one:
a. Local Area Network
b. Metropolitan Area Network
c. Wide Area Network
d. Home Network

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Adware
b. Patch
c. Driver
d. Ransomware

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it to
the attacker or the hacker.

Select one:
a. Pharming
b. Malware
c. Phishing
d. Spyware

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fill in the Blanks: Write the missing word to complete the sentence.
Session
Answer Layer allows session establishment between processes running on
different stations

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a distributed communication framework of network process among service requestors,


clients and service providers.

Select one:
a. Client-Server Model
b. Business-to-Business Model
c. Machine-to-Machine Model
d. Peer-to-Peer Model

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is the fast-growing area of crime because more and more criminals are exploiting the
speed, convenience and anonymity of the internet to commit a diverse range of criminal
activities.

Select one:
a. Cyber Crime
b. Backup
c. Disk Cleanup
d. Ethical Hacking

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a virus that replicates itself to infect the whole computer and typically used by attacker
to make a DoS or Denial of Service attack..

Select one:
a. Key Loggers
b. Trojans
c. Rootkits
d. Worms

Question 15
Complete
Mark 1.00 out of 1.00

Flag question

Question text

A type of wireless transmission that uses electromagnetic waves to transmit data through
air. Transmission is usually measured in Hertz and One Hertz is equivalent to one cycle per
second.
Select one:
a. Fiber-Optic
b. Radio Frequency
c. Satellite
d. Infrared
Question 16
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.

Select one:
True
False

Question 17
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Choose True if the Statement is True and False if the statement is False.

Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.

Select one:
True
False

Question 18
Complete
Mark 1.00 out of 1.00
Flag question

Question text

A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:
a. Trojans
b. Key Loggers
c. Rootkits
d. Worms

Question 19
Complete
Mark 1.00 out of 1.00

Flag question

Question text

It is a server that translates the public IP Address into Domain Names


Select one:
a. Router
b. Firewall
c. DHCP Server
d. DNS Server

Question 20
Complete
Mark 1.00 out of 1.00
Flag question

Question text

This are set of rules that governs a communication or the exchange of information.

Select one:
a. Protocol
b. Architecture
c. Connectivity
d. Standards

You might also like