Networking – End of Unit Assessment KS3
Quiz Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Networks 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 30
1. Question
Which statement best describes a wide area network?
CorrectIncorrect -
Question 2 of 30
2. Question
Which statement best describes the internet?
CorrectIncorrect -
Question 3 of 30
3. Question
What is a URL?
CorrectIncorrect -
Question 4 of 30
4. Question
What is a DNS?
CorrectIncorrect -
Question 5 of 30
5. Question
What is an ISP?
CorrectIncorrect -
Question 6 of 30
6. Question
What is a web host?
CorrectIncorrect -
Question 7 of 30
7. Question
What is an IP address?
CorrectIncorrect -
Question 8 of 30
8. Question
Which statement best defines what a network is?
CorrectIncorrect -
Question 9 of 30
9. Question
What is the name given to any device connected to a network?
CorrectIncorrect -
Question 10 of 30
10. Question
Which best describes what a ‘Local Area Network’ is?
CorrectIncorrect -
Question 11 of 30
11. Question
Tick the 4 different devices required to set up a LAN.
CorrectIncorrect -
Question 12 of 30
12. Question
Which device is required if you wish to connect a LAN to the internet?
CorrectIncorrect -
Question 13 of 30
13. Question
Select the device being described. “This device converts the data signals from a nodes into data signals that can be transferred across the network”.
CorrectIncorrect -
Question 14 of 30
14. Question
Select the device being described. “This device is considered as an ‘intelligent device’ as it sends data packets to the nodes or segments where the data is needed, rather than being broadcast to the whole network”.
CorrectIncorrect -
Question 15 of 30
15. Question
“Software, which monitors the activities of a computer user and sends back as much information about them as possible (e.g: passwords, usernames, websites they visit, purchases they have made)”. Which threat is being described here?
CorrectIncorrect -
Question 16 of 30
16. Question
“A set of rules and procedures that network users must follow to reduce the vulnerability of a network”…is an example of what security method?
CorrectIncorrect -
Question 17 of 30
17. Question
“Experts try to simulate a range of network attacks (such as Denial of Service attacks (DoS), SQL injections and Brute Force Attacks) in an attempt to discover any weaknesses in the system “…is an example of what security method?
CorrectIncorrect -
Question 18 of 30
18. Question
“Using direct communications, such as emails and phone calls, whilst impersonating legitimate companies (such as banks), asking you to give away sensitive information”. Which threat is being described here?
CorrectIncorrect -
Question 19 of 30
19. Question
“The process of using trial and error to hack an account by trying thousands of different possible passwords against a particular username”. Which threat is being described here?
CorrectIncorrect -
Question 20 of 30
20. Question
“Trying to bring down a website by using up its web server’s resources, by overloading it with traffic”. Which threat is being described here?
CorrectIncorrect -
Question 21 of 30
21. Question
“Software, which in general will harm a computer and/or its user”. Which threat is being described here?
CorrectIncorrect -
Question 22 of 30
22. Question
“Software, which is specifically designed to cause physical harm to a computer system”. Which threat is being described here?
CorrectIncorrect -
Question 23 of 30
23. Question
“Protects the data on a system from falling into the wrong hand as any intercepted data will be unreadable.”…is an example of what security method?
CorrectIncorrect -
Question 24 of 30
24. Question
Which statement best defines what a network is?
CorrectIncorrect -
Question 25 of 30
25. Question
What is the name given to any device connected to a network?
CorrectIncorrect -
Question 26 of 30
26. Question
Which best describes what a ‘Local Area Network’ is?
CorrectIncorrect -
Question 27 of 30
27. Question
Tick the 4 different devices required to set up a LAN.
CorrectIncorrect -
Question 28 of 30
28. Question
Which device is required if you wish to connect a LAN to the internet?
CorrectIncorrect -
Question 29 of 30
29. Question
Select the device being described. “This device converts the data signals from a nodes into data signals that can be transferred across the network”.
CorrectIncorrect -
Question 30 of 30
30. Question
Select the device being described. “This device is considered as an ‘intelligent device’ as it sends data packets to the nodes or segments where the data is needed, rather than being broadcast to the whole network”.
CorrectIncorrect