networky
  • 1. What does VPN stand for?
A) Virtual Private Network
B) Virtual Public Node
C) Verified Protected Network
  • 2. What is the main purpose of a VPN?
A) To store data locally
B) To hide your identity and secure your data over public networks
C) To increase internet speed
  • 3. Which component of a VPN converts data into unreadable form to protect it?
A) Tunneling protocol
B) VPN client
C) Encryption
  • 4. What does the VPN client do?
A) Monitors bandwidth usage
B) Initiates the VPN connection to the server
C) Stores encrypted data
  • 5. Which VPN protocol is primarily designed for mobile devices?
A) WireGuard
B) IKEv2/IPSec
C) OpenVPN
  • 6. In VPN encryption, which algorithm is commonly used for high security?
A) AES-256
B) CRC-32
C) MD5
  • 7. When an organization uses MFA (Multi-Factor Authentication) with its VPN, what security goal is primarily enhanced?
A) Authentication
B) Availability
C) Confidentiality
  • 8. What connector is used in a Metro Ethernet connection to link the customer site?
A) RJ45
B) USB
C) BNC
  • 9. Metro Ethernet is commonly deployed at what network level?
A) Metropolitan Area Network
B) International backbone
C) ersonal Area Network
  • 10. Which of the following best describes the “house rulebook” analogy in the lecture?
A) Access Control
B) AAA Framework
C) Remote Access Policy
  • 11. Which VPN topology offers better performance but is more complex to manage?
A) Mesh
B) Star
C) Linear
  • 12. The Principle of Least Privilege means:
A) Allowing users only the permissions necessary for their jobts
B) Giving everyone full administrative access
C) Assigning random permissions to increase security
  • 13. A proxy firewall differs from a stateful firewall because it:
A) Blocks traffic based only on port numbers
B) Does not monitor active connections
C) Intercepts and inspects traffic as an intermediary
  • 14. Why are leased lines more expensive?
A) They use outdated copper wiring
B) They can be shared by many users
C) Only the customer uses the entire line
  • 15. Why might free VPN services be risky for organizations?
A) They can log and sell user data
B) They have better latency than paid VPNs
C) They are fully compliant with enterprise policies
  • 16. In a security system, which component primarily “detects but does not stop” an attack?
A) Access Control
B) IPS
C) IDS
  • 17. Which type of VPN connection is most commonly used by home-based employees?
A) Split-Tunnel VPN
B) Remote Access VPN
C) Client-to-Client VPN
  • 18. In the AAA Framework, “Authentication” refers to:
A) Verifying a user’s identity
B) Deciding what a user can do
C) Encrypting network traffic
  • 19. Which access control model would be most appropriate in a military-grade classified environment?
A) MAC
B) ABAC
C) RBAC
  • 20. What is the main purpose of Zero Trust Network Access (ZTNA)?
A) To trust all internal users by default
B) To assume no user or device is trusted by default
C) To block all external users
  • 21. Which of the following best demonstrates the layered defense principle?
A) Using only a VPN for all traffic
B) Disabling VPN to improve network speed
C) Combining firewall, VPN, IDS/IPS, and access control
  • 22. Which step ensures everything works properly after the repair?
A) Identify the Problem
B) Verify Functionality
C) Establish a Theory
  • 23. “Decide what steps to fix the issue” refers to which step?
A) Establish a Plan of Action
B) Identify the Problem
C) Implement the Solution
  • 24. According to the slide, what does documentation help prevent?
A) Wi-Fi interference
B) Confusion and ensures consistency
C) Device overheating
  • 25. Which topology connects all branch offices to a central hub?
A) Star mesh
B) Hub and spoke
C) Hybrid
  • 26. What combination does Secure Remote Access (SRA) use for protection?
A) Easier to manage
B) Cheaper to implement
C) Better performance and redundancy
  • 27. What is a leased line?
A) A dedicated point-to-point connection
B) A wireless access point
C) A shared internet connection
  • 28. A protocol that allows you to control another computer remotely.
A) RDP
B) VPN
C) SSL
  • 29. What is the maximum download speed allowed by LTE standards?
A) 300 Mbps
B) 84 Mbps
C) 75 Mbps
  • 30. Modern VPN protocol known for being lightweight and secure.
A) WireGuard
B) OpenVPN
C) PPTP
  • 31. Which Wi-Fi standard operates only on 2.4 GHz and is described as “very old, slow”?
A) 802.11b
B) 02.11ac
C) Wi-Fi 6E
  • 32. Technology that processes data near the source (e.g., IoT devices).
A) Blockchain
B) Edge Computing
C) Cloud Computing
  • 33. A distributed system of linked records that is resistant to alteration.
A) Blockchain
B) Database
C) Firewall
  • 34. Method of protecting information by converting it into unreadable form.
A) Hashing
B) Decryption
C) Encryption
  • 35. Which Wi-Fi standard has a typical speed of 54 Mbps?
A) 802.11ac
B) 802.11g
C) 802.11ax
  • 36. 802.11n (Wi-Fi 4) supports which frequency band(s)?
A) 5 GHz only
B) 2.4 GHz only
C) 2.4 GHz and 5 GHz (dual band)
  • 37. is a systematic process used to identify,diagnose, and resolve problems in a network. it also helps to restore connectivity
A) AAA
B) Troubleshootng
C) WiFi
  • 38. Gather info, observe symptoms, ask users questions
A) Establish a theory
B) Test the theory
C) Identify the problem
  • 39. Which standard introduced gigabit-level speeds and is widely used?
A) 802.11ax
B) 802.11ax
C) 802.11ac (Wi-Fi 5)
  • 40. Which Wi-Fi standard is known for being more efficient with many devices?
A) 802.11ac (Wi-Fi 5)
B) 802.11b
C) 802.11ax (Wi-Fi 6)
  • 41. What was the main feature of 1G cellular technology?
A) High-speed internet
B) Voice communication only
C) Voice communication only
  • 42. Which access control type gives permissions based on user roles (e.g., admin, staff)?
A) User-Based Access Control
B) Role-Based Access Control
C) Discretionary Access Control
  • 43. Which IDS type alerts when it detects a known attack pattern?
A) Network-based IDS
B) Anomaly-based IDS
C) Signature-based IDS
  • 44. Which IDS type monitors a single computer or device?
A) Behavior-based IDS
B) Network-based IDS
C) Host-based IDS
  • 45. Which IDS type detects unusual or abnormal activities?
A) Signature-based
B) Anomaly-based
C) Host-based
  • 46. What marks the beginning of cellular WAN networking?
A) LTE
B) EDGE
C) 3G
  • 47. What type of firewall checks source and destination addresses of packets?
A) Packet filtering firewall
B) Next-generation firewall
C) Stateful inspection firewall
  • 48. Which firewall acts as an intermediary between users and the internet?
A) Proxy firewall
B) Stateful firewall
C) Packet filtering firewall
  • 49. Which firewall provides advanced features like intrusion prevention and deep packet inspection?
A) Stateful firewall
B) Packet filtering firewall
C) Next-generation firewall
  • 50. Which protocol is the fastest and most secure among modern VPN protocols?
A) L2TP/IPSec
B) WireGuard
C) OpenVPN
  • 51. Which VPN type allows employees to connect from home to their company network?
A) Remote access VPN
B) Site-to-site VPN
C) Client-to-site VPN
  • 52. Which VPN protocol is simple but weak?
A) WireGuard
B) PPTP
C) IKEv2/IPSec
  • 53. Which VPN topology connects all branch offices to one central location?
A) Hub and spoke
B) Full mesh
C) Star mesh
  • 54. What does RDP allow you to do?
A) Encrypt data
B) Control another computer remotely
C) Filter IP addresses
  • 55. What technology allows secure access through a web browser?
A) OpenVPN
B) IPSec
C) SSL VPN
  • 56. What tool is used for network traffic analysis?
A) Wireshark
B) Firewall
C) VPN client show answer
  • 57. Which cellular generation added simple data transmission such as text?
A) 3G
B) 2G
C) 4G
  • 58. What did EDGE provide in cellular technology?
A) Satellite connectivity
B) Basic cellular data as a bridge between 2G and 3G
C) High-speed video calls
  • 59. Which step checks if your assumption is correct?
A) Test the Theory
B) Document the Findings
C) Verify Functionality
  • 60. connected to every other device
A) hub and spoke
B) full mesh
C) star mesh
  • 61. “Based on signs, guess the possible cause” refers to which step?
A) Test the Theory
B) Implement the Solution
C) Establish a Theory
  • 62. Wi-Fi 6E operates at which frequency?
A) 2.4 GHz
B) 2.4/5 GHz
C) 6 GHz
  • 63. Measures the number of routers a packet passes through
A) Hop count
B) simpler
C) Distance vector
  • 64. the maximum hop count allowed in RIP before a network is considered unreachable?
A) 10
B) 30
C) 15
  • 65. routers share their entire routing tables every __seconds
A) 30
B) 20
C) 15
  • 66. Each router only knows its immediate neighbors routes
A) Distance vector
B) Hop count
C) router
  • 67. Which of the following is a Link-State Routing Protocol?
A) OSPF
B) EIGRP
C) RIP
  • 68. In link-state routing, each router creates a copy of the network topology using what algorithm?
A) Dijkstra (Shortest Path First)
B) Bellman-Ford
C) Backtracking
  • 69. Divides networks into areas for efficiency
A) Hierarchical design
B) Link state
C) Cost metric
  • 70. Which of the following is a distance-vector routing protocol?
A) OSPF
B) RIP
C) ISIS
  • 71. Which version of RIP supports classless routing (VLSM)?
A) RIP v1
B) RIP v2
  • 72. In frequency bands what is the longer range, lower speed
A) 2.4 GHz
B) 6 GHz
C) 5GHz
  • 73. In frequency bands what is the shorter range, higher speed
A) 6 GHz
B) 2.4 GHz
C) 5GHz
  • 74. In frequency bands what is the fastest, short range
A) 5GHz
B) 2.4 GHz
C) 6 GHz
  • 75. Which Wi-Fi security protocol is currently the most secure?
A) WPA3
B) WPA2
C) WEP
  • 76. test connectivity between devices
A) treacert
B) config
C) ping
  • 77. shows ip settings and network interface info.
A) IP config/IF config
B) ping
C) treacert
  • 78. shows the path your data takes across networks
A) ping
B) config
C) tracert/traceroute
  • 79. scans devices and open parts
A) Nmap
B) wireshark
C) snmp
  • 80. monitor device performance and traffic
A) arp
B) nmap
C) snmp tools
  • 81. What is the maximum data transfer rate of Fast Ethernet?
A) 50 mbps
B) 10mbps
C) 100 mbps
Created with That Quiz — a math test site for students of all grade levels.