networky
  • 1. What does VPN stand for?
A) Virtual Private Network
B) Verified Protected Network
C) Virtual Public Node
  • 2. What is the main purpose of a VPN?
A) To store data locally
B) To increase internet speed
C) To hide your identity and secure your data over public networks
  • 3. Which component of a VPN converts data into unreadable form to protect it?
A) Tunneling protocol
B) Encryption
C) VPN client
  • 4. What does the VPN client do?
A) Monitors bandwidth usage
B) Stores encrypted data
C) Initiates the VPN connection to the server
  • 5. Which VPN protocol is primarily designed for mobile devices?
A) WireGuard
B) OpenVPN
C) IKEv2/IPSec
  • 6. In VPN encryption, which algorithm is commonly used for high security?
A) CRC-32
B) MD5
C) AES-256
  • 7. When an organization uses MFA (Multi-Factor Authentication) with its VPN, what security goal is primarily enhanced?
A) Authentication
B) Confidentiality
C) Availability
  • 8. What connector is used in a Metro Ethernet connection to link the customer site?
A) RJ45
B) BNC
C) USB
  • 9. Metro Ethernet is commonly deployed at what network level?
A) International backbone
B) Metropolitan Area Network
C) ersonal Area Network
  • 10. Which of the following best describes the “house rulebook” analogy in the lecture?
A) AAA Framework
B) Remote Access Policy
C) Access Control
  • 11. Which VPN topology offers better performance but is more complex to manage?
A) Star
B) Mesh
C) Linear
  • 12. The Principle of Least Privilege means:
A) Giving everyone full administrative access
B) Allowing users only the permissions necessary for their jobts
C) Assigning random permissions to increase security
  • 13. A proxy firewall differs from a stateful firewall because it:
A) Intercepts and inspects traffic as an intermediary
B) Does not monitor active connections
C) Blocks traffic based only on port numbers
  • 14. Why are leased lines more expensive?
A) They use outdated copper wiring
B) They can be shared by many users
C) Only the customer uses the entire line
  • 15. Why might free VPN services be risky for organizations?
A) They can log and sell user data
B) They are fully compliant with enterprise policies
C) They have better latency than paid VPNs
  • 16. In a security system, which component primarily “detects but does not stop” an attack?
A) IDS
B) IPS
C) Access Control
  • 17. Which type of VPN connection is most commonly used by home-based employees?
A) Client-to-Client VPN
B) Split-Tunnel VPN
C) Remote Access VPN
  • 18. In the AAA Framework, “Authentication” refers to:
A) Deciding what a user can do
B) Verifying a user’s identity
C) Encrypting network traffic
  • 19. Which access control model would be most appropriate in a military-grade classified environment?
A) ABAC
B) MAC
C) RBAC
  • 20. What is the main purpose of Zero Trust Network Access (ZTNA)?
A) To trust all internal users by default
B) To assume no user or device is trusted by default
C) To block all external users
  • 21. Which of the following best demonstrates the layered defense principle?
A) Disabling VPN to improve network speed
B) Using only a VPN for all traffic
C) Combining firewall, VPN, IDS/IPS, and access control
  • 22. Which step ensures everything works properly after the repair?
A) Identify the Problem
B) Verify Functionality
C) Establish a Theory
  • 23. “Decide what steps to fix the issue” refers to which step?
A) Implement the Solution
B) Identify the Problem
C) Establish a Plan of Action
  • 24. According to the slide, what does documentation help prevent?
A) Wi-Fi interference
B) Confusion and ensures consistency
C) Device overheating
  • 25. Which topology connects all branch offices to a central hub?
A) Hub and spoke
B) Star mesh
C) Hybrid
  • 26. What combination does Secure Remote Access (SRA) use for protection?
A) Better performance and redundancy
B) Cheaper to implement
C) Easier to manage
  • 27. What is a leased line?
A) A dedicated point-to-point connection
B) A wireless access point
C) A shared internet connection
  • 28. A protocol that allows you to control another computer remotely.
A) SSL
B) VPN
C) RDP
  • 29. What is the maximum download speed allowed by LTE standards?
A) 84 Mbps
B) 300 Mbps
C) 75 Mbps
  • 30. Modern VPN protocol known for being lightweight and secure.
A) WireGuard
B) PPTP
C) OpenVPN
  • 31. Which Wi-Fi standard operates only on 2.4 GHz and is described as “very old, slow”?
A) 02.11ac
B) Wi-Fi 6E
C) 802.11b
  • 32. Technology that processes data near the source (e.g., IoT devices).
A) Cloud Computing
B) Blockchain
C) Edge Computing
  • 33. A distributed system of linked records that is resistant to alteration.
A) Firewall
B) Database
C) Blockchain
  • 34. Method of protecting information by converting it into unreadable form.
A) Encryption
B) Decryption
C) Hashing
  • 35. Which Wi-Fi standard has a typical speed of 54 Mbps?
A) 802.11ax
B) 802.11ac
C) 802.11g
  • 36. 802.11n (Wi-Fi 4) supports which frequency band(s)?
A) 5 GHz only
B) 2.4 GHz and 5 GHz (dual band)
C) 2.4 GHz only
  • 37. is a systematic process used to identify,diagnose, and resolve problems in a network. it also helps to restore connectivity
A) WiFi
B) AAA
C) Troubleshootng
  • 38. Gather info, observe symptoms, ask users questions
A) Test the theory
B) Identify the problem
C) Establish a theory
  • 39. Which standard introduced gigabit-level speeds and is widely used?
A) 802.11ax
B) 802.11ac (Wi-Fi 5)
C) 802.11ax
  • 40. Which Wi-Fi standard is known for being more efficient with many devices?
A) 802.11ax (Wi-Fi 6)
B) 802.11ac (Wi-Fi 5)
C) 802.11b
  • 41. What was the main feature of 1G cellular technology?
A) Voice communication only
B) High-speed internet
C) Voice communication only
  • 42. Which access control type gives permissions based on user roles (e.g., admin, staff)?
A) Discretionary Access Control
B) Role-Based Access Control
C) User-Based Access Control
  • 43. Which IDS type alerts when it detects a known attack pattern?
A) Anomaly-based IDS
B) Signature-based IDS
C) Network-based IDS
  • 44. Which IDS type monitors a single computer or device?
A) Network-based IDS
B) Behavior-based IDS
C) Host-based IDS
  • 45. Which IDS type detects unusual or abnormal activities?
A) Host-based
B) Anomaly-based
C) Signature-based
  • 46. What marks the beginning of cellular WAN networking?
A) EDGE
B) 3G
C) LTE
  • 47. What type of firewall checks source and destination addresses of packets?
A) Packet filtering firewall
B) Stateful inspection firewall
C) Next-generation firewall
  • 48. Which firewall acts as an intermediary between users and the internet?
A) Stateful firewall
B) Packet filtering firewall
C) Proxy firewall
  • 49. Which firewall provides advanced features like intrusion prevention and deep packet inspection?
A) Stateful firewall
B) Next-generation firewall
C) Packet filtering firewall
  • 50. Which protocol is the fastest and most secure among modern VPN protocols?
A) OpenVPN
B) WireGuard
C) L2TP/IPSec
  • 51. Which VPN type allows employees to connect from home to their company network?
A) Site-to-site VPN
B) Client-to-site VPN
C) Remote access VPN
  • 52. Which VPN protocol is simple but weak?
A) WireGuard
B) PPTP
C) IKEv2/IPSec
  • 53. Which VPN topology connects all branch offices to one central location?
A) Full mesh
B) Hub and spoke
C) Star mesh
  • 54. What does RDP allow you to do?
A) Encrypt data
B) Filter IP addresses
C) Control another computer remotely
  • 55. What technology allows secure access through a web browser?
A) IPSec
B) OpenVPN
C) SSL VPN
  • 56. What tool is used for network traffic analysis?
A) Wireshark
B) Firewall
C) VPN client show answer
  • 57. Which cellular generation added simple data transmission such as text?
A) 4G
B) 2G
C) 3G
  • 58. What did EDGE provide in cellular technology?
A) Satellite connectivity
B) Basic cellular data as a bridge between 2G and 3G
C) High-speed video calls
  • 59. Which step checks if your assumption is correct?
A) Test the Theory
B) Document the Findings
C) Verify Functionality
  • 60. connected to every other device
A) star mesh
B) full mesh
C) hub and spoke
  • 61. “Based on signs, guess the possible cause” refers to which step?
A) Implement the Solution
B) Establish a Theory
C) Test the Theory
  • 62. Wi-Fi 6E operates at which frequency?
A) 2.4/5 GHz
B) 2.4 GHz
C) 6 GHz
  • 63. Measures the number of routers a packet passes through
A) simpler
B) Hop count
C) Distance vector
  • 64. the maximum hop count allowed in RIP before a network is considered unreachable?
A) 10
B) 15
C) 30
  • 65. routers share their entire routing tables every __seconds
A) 15
B) 30
C) 20
  • 66. Each router only knows its immediate neighbors routes
A) Distance vector
B) Hop count
C) router
  • 67. Which of the following is a Link-State Routing Protocol?
A) RIP
B) EIGRP
C) OSPF
  • 68. In link-state routing, each router creates a copy of the network topology using what algorithm?
A) Bellman-Ford
B) Backtracking
C) Dijkstra (Shortest Path First)
  • 69. Divides networks into areas for efficiency
A) Cost metric
B) Hierarchical design
C) Link state
  • 70. Which of the following is a distance-vector routing protocol?
A) OSPF
B) ISIS
C) RIP
  • 71. Which version of RIP supports classless routing (VLSM)?
A) RIP v2
B) RIP v1
  • 72. In frequency bands what is the longer range, lower speed
A) 2.4 GHz
B) 6 GHz
C) 5GHz
  • 73. In frequency bands what is the shorter range, higher speed
A) 5GHz
B) 6 GHz
C) 2.4 GHz
  • 74. In frequency bands what is the fastest, short range
A) 5GHz
B) 2.4 GHz
C) 6 GHz
  • 75. Which Wi-Fi security protocol is currently the most secure?
A) WPA3
B) WEP
C) WPA2
  • 76. test connectivity between devices
A) treacert
B) ping
C) config
  • 77. shows ip settings and network interface info.
A) IP config/IF config
B) ping
C) treacert
  • 78. shows the path your data takes across networks
A) config
B) tracert/traceroute
C) ping
  • 79. scans devices and open parts
A) Nmap
B) wireshark
C) snmp
  • 80. monitor device performance and traffic
A) nmap
B) arp
C) snmp tools
  • 81. What is the maximum data transfer rate of Fast Ethernet?
A) 50 mbps
B) 10mbps
C) 100 mbps
Created with That Quiz — a math test site for students of all grade levels.