ThatQuiz Test Library Take this test now
networky
Contributed by: Roan
  • 1. What does VPN stand for?
A) Virtual Public Node
B) Verified Protected Network
C) Virtual Private Network
  • 2. What is the main purpose of a VPN?
A) To store data locally
B) To increase internet speed
C) To hide your identity and secure your data over public networks
  • 3. Which component of a VPN converts data into unreadable form to protect it?
A) VPN client
B) Tunneling protocol
C) Encryption
  • 4. What does the VPN client do?
A) Initiates the VPN connection to the server
B) Monitors bandwidth usage
C) Stores encrypted data
  • 5. Which VPN protocol is primarily designed for mobile devices?
A) WireGuard
B) IKEv2/IPSec
C) OpenVPN
  • 6. In VPN encryption, which algorithm is commonly used for high security?
A) CRC-32
B) AES-256
C) MD5
  • 7. When an organization uses MFA (Multi-Factor Authentication) with its VPN, what security goal is primarily enhanced?
A) Availability
B) Confidentiality
C) Authentication
  • 8. What connector is used in a Metro Ethernet connection to link the customer site?
A) USB
B) RJ45
C) BNC
  • 9. Metro Ethernet is commonly deployed at what network level?
A) ersonal Area Network
B) Metropolitan Area Network
C) International backbone
  • 10. Which of the following best describes the “house rulebook” analogy in the lecture?
A) Access Control
B) Remote Access Policy
C) AAA Framework
  • 11. Which VPN topology offers better performance but is more complex to manage?
A) Mesh
B) Star
C) Linear
  • 12. The Principle of Least Privilege means:
A) Assigning random permissions to increase security
B) Giving everyone full administrative access
C) Allowing users only the permissions necessary for their jobts
  • 13. A proxy firewall differs from a stateful firewall because it:
A) Intercepts and inspects traffic as an intermediary
B) Does not monitor active connections
C) Blocks traffic based only on port numbers
  • 14. Why are leased lines more expensive?
A) Only the customer uses the entire line
B) They can be shared by many users
C) They use outdated copper wiring
  • 15. Why might free VPN services be risky for organizations?
A) They can log and sell user data
B) They are fully compliant with enterprise policies
C) They have better latency than paid VPNs
  • 16. In a security system, which component primarily “detects but does not stop” an attack?
A) IDS
B) IPS
C) Access Control
  • 17. Which type of VPN connection is most commonly used by home-based employees?
A) Split-Tunnel VPN
B) Remote Access VPN
C) Client-to-Client VPN
  • 18. In the AAA Framework, “Authentication” refers to:
A) Deciding what a user can do
B) Encrypting network traffic
C) Verifying a user’s identity
  • 19. Which access control model would be most appropriate in a military-grade classified environment?
A) MAC
B) ABAC
C) RBAC
  • 20. What is the main purpose of Zero Trust Network Access (ZTNA)?
A) To block all external users
B) To assume no user or device is trusted by default
C) To trust all internal users by default
  • 21. Which of the following best demonstrates the layered defense principle?
A) Combining firewall, VPN, IDS/IPS, and access control
B) Using only a VPN for all traffic
C) Disabling VPN to improve network speed
  • 22. Which step ensures everything works properly after the repair?
A) Establish a Theory
B) Verify Functionality
C) Identify the Problem
  • 23. “Decide what steps to fix the issue” refers to which step?
A) Establish a Plan of Action
B) Implement the Solution
C) Identify the Problem
  • 24. According to the slide, what does documentation help prevent?
A) Confusion and ensures consistency
B) Device overheating
C) Wi-Fi interference
  • 25. Which topology connects all branch offices to a central hub?
A) Hybrid
B) Hub and spoke
C) Star mesh
  • 26. What combination does Secure Remote Access (SRA) use for protection?
A) Easier to manage
B) Cheaper to implement
C) Better performance and redundancy
  • 27. What is a leased line?
A) A shared internet connection
B) A wireless access point
C) A dedicated point-to-point connection
  • 28. A protocol that allows you to control another computer remotely.
A) VPN
B) SSL
C) RDP
  • 29. What is the maximum download speed allowed by LTE standards?
A) 75 Mbps
B) 300 Mbps
C) 84 Mbps
  • 30. Modern VPN protocol known for being lightweight and secure.
A) WireGuard
B) PPTP
C) OpenVPN
  • 31. Which Wi-Fi standard operates only on 2.4 GHz and is described as “very old, slow”?
A) Wi-Fi 6E
B) 802.11b
C) 02.11ac
  • 32. Technology that processes data near the source (e.g., IoT devices).
A) Cloud Computing
B) Blockchain
C) Edge Computing
  • 33. A distributed system of linked records that is resistant to alteration.
A) Blockchain
B) Firewall
C) Database
  • 34. Method of protecting information by converting it into unreadable form.
A) Encryption
B) Decryption
C) Hashing
  • 35. Which Wi-Fi standard has a typical speed of 54 Mbps?
A) 802.11ac
B) 802.11g
C) 802.11ax
  • 36. 802.11n (Wi-Fi 4) supports which frequency band(s)?
A) 5 GHz only
B) 2.4 GHz only
C) 2.4 GHz and 5 GHz (dual band)
  • 37. is a systematic process used to identify,diagnose, and resolve problems in a network. it also helps to restore connectivity
A) AAA
B) WiFi
C) Troubleshootng
  • 38. Gather info, observe symptoms, ask users questions
A) Identify the problem
B) Test the theory
C) Establish a theory
  • 39. Which standard introduced gigabit-level speeds and is widely used?
A) 802.11ax
B) 802.11ax
C) 802.11ac (Wi-Fi 5)
  • 40. Which Wi-Fi standard is known for being more efficient with many devices?
A) 802.11b
B) 802.11ac (Wi-Fi 5)
C) 802.11ax (Wi-Fi 6)
  • 41. What was the main feature of 1G cellular technology?
A) High-speed internet
B) Voice communication only
C) Voice communication only
  • 42. Which access control type gives permissions based on user roles (e.g., admin, staff)?
A) Discretionary Access Control
B) User-Based Access Control
C) Role-Based Access Control
  • 43. Which IDS type alerts when it detects a known attack pattern?
A) Signature-based IDS
B) Network-based IDS
C) Anomaly-based IDS
  • 44. Which IDS type monitors a single computer or device?
A) Behavior-based IDS
B) Host-based IDS
C) Network-based IDS
  • 45. Which IDS type detects unusual or abnormal activities?
A) Signature-based
B) Anomaly-based
C) Host-based
  • 46. What marks the beginning of cellular WAN networking?
A) EDGE
B) 3G
C) LTE
  • 47. What type of firewall checks source and destination addresses of packets?
A) Next-generation firewall
B) Packet filtering firewall
C) Stateful inspection firewall
  • 48. Which firewall acts as an intermediary between users and the internet?
A) Proxy firewall
B) Packet filtering firewall
C) Stateful firewall
  • 49. Which firewall provides advanced features like intrusion prevention and deep packet inspection?
A) Next-generation firewall
B) Stateful firewall
C) Packet filtering firewall
  • 50. Which protocol is the fastest and most secure among modern VPN protocols?
A) L2TP/IPSec
B) WireGuard
C) OpenVPN
  • 51. Which VPN type allows employees to connect from home to their company network?
A) Remote access VPN
B) Site-to-site VPN
C) Client-to-site VPN
  • 52. Which VPN protocol is simple but weak?
A) IKEv2/IPSec
B) PPTP
C) WireGuard
  • 53. Which VPN topology connects all branch offices to one central location?
A) Star mesh
B) Hub and spoke
C) Full mesh
  • 54. What does RDP allow you to do?
A) Encrypt data
B) Filter IP addresses
C) Control another computer remotely
  • 55. What technology allows secure access through a web browser?
A) IPSec
B) OpenVPN
C) SSL VPN
  • 56. What tool is used for network traffic analysis?
A) VPN client show answer
B) Wireshark
C) Firewall
  • 57. Which cellular generation added simple data transmission such as text?
A) 4G
B) 2G
C) 3G
  • 58. What did EDGE provide in cellular technology?
A) High-speed video calls
B) Basic cellular data as a bridge between 2G and 3G
C) Satellite connectivity
  • 59. Which step checks if your assumption is correct?
A) Verify Functionality
B) Test the Theory
C) Document the Findings
  • 60. connected to every other device
A) hub and spoke
B) star mesh
C) full mesh
  • 61. “Based on signs, guess the possible cause” refers to which step?
A) Implement the Solution
B) Establish a Theory
C) Test the Theory
  • 62. Wi-Fi 6E operates at which frequency?
A) 6 GHz
B) 2.4 GHz
C) 2.4/5 GHz
  • 63. Measures the number of routers a packet passes through
A) Distance vector
B) simpler
C) Hop count
  • 64. the maximum hop count allowed in RIP before a network is considered unreachable?
A) 10
B) 30
C) 15
  • 65. routers share their entire routing tables every __seconds
A) 20
B) 30
C) 15
  • 66. Each router only knows its immediate neighbors routes
A) Hop count
B) Distance vector
C) router
  • 67. Which of the following is a Link-State Routing Protocol?
A) EIGRP
B) RIP
C) OSPF
  • 68. In link-state routing, each router creates a copy of the network topology using what algorithm?
A) Dijkstra (Shortest Path First)
B) Backtracking
C) Bellman-Ford
  • 69. Divides networks into areas for efficiency
A) Link state
B) Cost metric
C) Hierarchical design
  • 70. Which of the following is a distance-vector routing protocol?
A) ISIS
B) RIP
C) OSPF
  • 71. Which version of RIP supports classless routing (VLSM)?
A) RIP v1
B) RIP v2
  • 72. In frequency bands what is the longer range, lower speed
A) 5GHz
B) 2.4 GHz
C) 6 GHz
  • 73. In frequency bands what is the shorter range, higher speed
A) 5GHz
B) 2.4 GHz
C) 6 GHz
  • 74. In frequency bands what is the fastest, short range
A) 5GHz
B) 2.4 GHz
C) 6 GHz
  • 75. Which Wi-Fi security protocol is currently the most secure?
A) WPA2
B) WPA3
C) WEP
  • 76. test connectivity between devices
A) treacert
B) config
C) ping
  • 77. shows ip settings and network interface info.
A) ping
B) IP config/IF config
C) treacert
  • 78. shows the path your data takes across networks
A) tracert/traceroute
B) config
C) ping
  • 79. scans devices and open parts
A) Nmap
B) wireshark
C) snmp
  • 80. monitor device performance and traffic
A) nmap
B) snmp tools
C) arp
  • 81. What is the maximum data transfer rate of Fast Ethernet?
A) 50 mbps
B) 10mbps
C) 100 mbps
Created with That Quiz — a math test site for students of all grade levels.