networky
  • 1. What does VPN stand for?
A) Virtual Public Node
B) Verified Protected Network
C) Virtual Private Network
  • 2. What is the main purpose of a VPN?
A) To increase internet speed
B) To store data locally
C) To hide your identity and secure your data over public networks
  • 3. Which component of a VPN converts data into unreadable form to protect it?
A) Encryption
B) Tunneling protocol
C) VPN client
  • 4. What does the VPN client do?
A) Initiates the VPN connection to the server
B) Monitors bandwidth usage
C) Stores encrypted data
  • 5. Which VPN protocol is primarily designed for mobile devices?
A) IKEv2/IPSec
B) WireGuard
C) OpenVPN
  • 6. In VPN encryption, which algorithm is commonly used for high security?
A) AES-256
B) MD5
C) CRC-32
  • 7. When an organization uses MFA (Multi-Factor Authentication) with its VPN, what security goal is primarily enhanced?
A) Confidentiality
B) Authentication
C) Availability
  • 8. What connector is used in a Metro Ethernet connection to link the customer site?
A) RJ45
B) BNC
C) USB
  • 9. Metro Ethernet is commonly deployed at what network level?
A) ersonal Area Network
B) International backbone
C) Metropolitan Area Network
  • 10. Which of the following best describes the “house rulebook” analogy in the lecture?
A) AAA Framework
B) Remote Access Policy
C) Access Control
  • 11. Which VPN topology offers better performance but is more complex to manage?
A) Star
B) Linear
C) Mesh
  • 12. The Principle of Least Privilege means:
A) Assigning random permissions to increase security
B) Allowing users only the permissions necessary for their jobts
C) Giving everyone full administrative access
  • 13. A proxy firewall differs from a stateful firewall because it:
A) Does not monitor active connections
B) Intercepts and inspects traffic as an intermediary
C) Blocks traffic based only on port numbers
  • 14. Why are leased lines more expensive?
A) They use outdated copper wiring
B) They can be shared by many users
C) Only the customer uses the entire line
  • 15. Why might free VPN services be risky for organizations?
A) They have better latency than paid VPNs
B) They can log and sell user data
C) They are fully compliant with enterprise policies
  • 16. In a security system, which component primarily “detects but does not stop” an attack?
A) Access Control
B) IPS
C) IDS
  • 17. Which type of VPN connection is most commonly used by home-based employees?
A) Split-Tunnel VPN
B) Client-to-Client VPN
C) Remote Access VPN
  • 18. In the AAA Framework, “Authentication” refers to:
A) Encrypting network traffic
B) Deciding what a user can do
C) Verifying a user’s identity
  • 19. Which access control model would be most appropriate in a military-grade classified environment?
A) MAC
B) RBAC
C) ABAC
  • 20. What is the main purpose of Zero Trust Network Access (ZTNA)?
A) To block all external users
B) To assume no user or device is trusted by default
C) To trust all internal users by default
  • 21. Which of the following best demonstrates the layered defense principle?
A) Combining firewall, VPN, IDS/IPS, and access control
B) Using only a VPN for all traffic
C) Disabling VPN to improve network speed
  • 22. Which step ensures everything works properly after the repair?
A) Identify the Problem
B) Establish a Theory
C) Verify Functionality
  • 23. “Decide what steps to fix the issue” refers to which step?
A) Identify the Problem
B) Implement the Solution
C) Establish a Plan of Action
  • 24. According to the slide, what does documentation help prevent?
A) Confusion and ensures consistency
B) Device overheating
C) Wi-Fi interference
  • 25. Which topology connects all branch offices to a central hub?
A) Hybrid
B) Star mesh
C) Hub and spoke
  • 26. What combination does Secure Remote Access (SRA) use for protection?
A) Better performance and redundancy
B) Cheaper to implement
C) Easier to manage
  • 27. What is a leased line?
A) A shared internet connection
B) A dedicated point-to-point connection
C) A wireless access point
  • 28. A protocol that allows you to control another computer remotely.
A) SSL
B) RDP
C) VPN
  • 29. What is the maximum download speed allowed by LTE standards?
A) 84 Mbps
B) 300 Mbps
C) 75 Mbps
  • 30. Modern VPN protocol known for being lightweight and secure.
A) WireGuard
B) PPTP
C) OpenVPN
  • 31. Which Wi-Fi standard operates only on 2.4 GHz and is described as “very old, slow”?
A) Wi-Fi 6E
B) 802.11b
C) 02.11ac
  • 32. Technology that processes data near the source (e.g., IoT devices).
A) Blockchain
B) Cloud Computing
C) Edge Computing
  • 33. A distributed system of linked records that is resistant to alteration.
A) Blockchain
B) Firewall
C) Database
  • 34. Method of protecting information by converting it into unreadable form.
A) Hashing
B) Decryption
C) Encryption
  • 35. Which Wi-Fi standard has a typical speed of 54 Mbps?
A) 802.11g
B) 802.11ax
C) 802.11ac
  • 36. 802.11n (Wi-Fi 4) supports which frequency band(s)?
A) 2.4 GHz only
B) 5 GHz only
C) 2.4 GHz and 5 GHz (dual band)
  • 37. is a systematic process used to identify,diagnose, and resolve problems in a network. it also helps to restore connectivity
A) Troubleshootng
B) AAA
C) WiFi
  • 38. Gather info, observe symptoms, ask users questions
A) Identify the problem
B) Test the theory
C) Establish a theory
  • 39. Which standard introduced gigabit-level speeds and is widely used?
A) 802.11ac (Wi-Fi 5)
B) 802.11ax
C) 802.11ax
  • 40. Which Wi-Fi standard is known for being more efficient with many devices?
A) 802.11ac (Wi-Fi 5)
B) 802.11ax (Wi-Fi 6)
C) 802.11b
  • 41. What was the main feature of 1G cellular technology?
A) High-speed internet
B) Voice communication only
C) Voice communication only
  • 42. Which access control type gives permissions based on user roles (e.g., admin, staff)?
A) Discretionary Access Control
B) User-Based Access Control
C) Role-Based Access Control
  • 43. Which IDS type alerts when it detects a known attack pattern?
A) Network-based IDS
B) Signature-based IDS
C) Anomaly-based IDS
  • 44. Which IDS type monitors a single computer or device?
A) Network-based IDS
B) Behavior-based IDS
C) Host-based IDS
  • 45. Which IDS type detects unusual or abnormal activities?
A) Host-based
B) Signature-based
C) Anomaly-based
  • 46. What marks the beginning of cellular WAN networking?
A) 3G
B) EDGE
C) LTE
  • 47. What type of firewall checks source and destination addresses of packets?
A) Packet filtering firewall
B) Stateful inspection firewall
C) Next-generation firewall
  • 48. Which firewall acts as an intermediary between users and the internet?
A) Stateful firewall
B) Packet filtering firewall
C) Proxy firewall
  • 49. Which firewall provides advanced features like intrusion prevention and deep packet inspection?
A) Stateful firewall
B) Next-generation firewall
C) Packet filtering firewall
  • 50. Which protocol is the fastest and most secure among modern VPN protocols?
A) L2TP/IPSec
B) OpenVPN
C) WireGuard
  • 51. Which VPN type allows employees to connect from home to their company network?
A) Remote access VPN
B) Site-to-site VPN
C) Client-to-site VPN
  • 52. Which VPN protocol is simple but weak?
A) IKEv2/IPSec
B) WireGuard
C) PPTP
  • 53. Which VPN topology connects all branch offices to one central location?
A) Full mesh
B) Hub and spoke
C) Star mesh
  • 54. What does RDP allow you to do?
A) Control another computer remotely
B) Filter IP addresses
C) Encrypt data
  • 55. What technology allows secure access through a web browser?
A) SSL VPN
B) IPSec
C) OpenVPN
  • 56. What tool is used for network traffic analysis?
A) VPN client show answer
B) Wireshark
C) Firewall
  • 57. Which cellular generation added simple data transmission such as text?
A) 4G
B) 2G
C) 3G
  • 58. What did EDGE provide in cellular technology?
A) Basic cellular data as a bridge between 2G and 3G
B) High-speed video calls
C) Satellite connectivity
  • 59. Which step checks if your assumption is correct?
A) Document the Findings
B) Test the Theory
C) Verify Functionality
  • 60. connected to every other device
A) star mesh
B) hub and spoke
C) full mesh
  • 61. “Based on signs, guess the possible cause” refers to which step?
A) Test the Theory
B) Establish a Theory
C) Implement the Solution
  • 62. Wi-Fi 6E operates at which frequency?
A) 2.4 GHz
B) 6 GHz
C) 2.4/5 GHz
  • 63. Measures the number of routers a packet passes through
A) Hop count
B) simpler
C) Distance vector
  • 64. the maximum hop count allowed in RIP before a network is considered unreachable?
A) 10
B) 15
C) 30
  • 65. routers share their entire routing tables every __seconds
A) 20
B) 15
C) 30
  • 66. Each router only knows its immediate neighbors routes
A) Hop count
B) Distance vector
C) router
  • 67. Which of the following is a Link-State Routing Protocol?
A) RIP
B) EIGRP
C) OSPF
  • 68. In link-state routing, each router creates a copy of the network topology using what algorithm?
A) Bellman-Ford
B) Backtracking
C) Dijkstra (Shortest Path First)
  • 69. Divides networks into areas for efficiency
A) Cost metric
B) Hierarchical design
C) Link state
  • 70. Which of the following is a distance-vector routing protocol?
A) OSPF
B) ISIS
C) RIP
  • 71. Which version of RIP supports classless routing (VLSM)?
A) RIP v2
B) RIP v1
  • 72. In frequency bands what is the longer range, lower speed
A) 5GHz
B) 6 GHz
C) 2.4 GHz
  • 73. In frequency bands what is the shorter range, higher speed
A) 6 GHz
B) 2.4 GHz
C) 5GHz
  • 74. In frequency bands what is the fastest, short range
A) 2.4 GHz
B) 6 GHz
C) 5GHz
  • 75. Which Wi-Fi security protocol is currently the most secure?
A) WPA3
B) WPA2
C) WEP
  • 76. test connectivity between devices
A) ping
B) treacert
C) config
  • 77. shows ip settings and network interface info.
A) treacert
B) ping
C) IP config/IF config
  • 78. shows the path your data takes across networks
A) config
B) ping
C) tracert/traceroute
  • 79. scans devices and open parts
A) wireshark
B) Nmap
C) snmp
  • 80. monitor device performance and traffic
A) arp
B) nmap
C) snmp tools
  • 81. What is the maximum data transfer rate of Fast Ethernet?
A) 50 mbps
B) 100 mbps
C) 10mbps
Created with That Quiz — a math test site for students of all grade levels.