Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Knowledge Quiz 1

Unit and Assessment Details


Assessment Title Knowledge Quiz 1
Unit/Cluster Code ICTNWK405
Unit/Cluster Title Build a small wireless local area network
Course Code - Title ICT50415 – Diploma in Information Technology Networking
Assessment Date/Due Date 27-July-2016, due 3-August-2016

Student ID SI00952
Student Name Amandeep Kaur

Assessment Instructions for Students

1. This assessment has to be completed individually.


2. Complete your details in the table above.
3. Write your answers in the space provided.
4. You must use your own words to formulate the answers.
5. Provide references to any source materials you have used.

Required Resources and Tools for this assessment

Following resources and tools required to complete this assessment will be made available to you at
the time of assessment:
1. Computer with access to LMS and Internet

Knowledge Quiz 1 Version: 1.0 – 22-April-2016 – Current Page 1 of 5


Knowledge Quiz 1
Online quiz

Write your answers in the space provided.

Instructions for learners:

1. Which of the following is not a security threat?


a. Social Engineering
b. Malware
c. Ransomware
d. Firmware

D
Correct

2. Which two (2) of the following statements are not true?


a. Intrusion detection systems can identify malicious traffic
b. Intrusion detection can remove viruses and other malware
c. Intrusion detection tends to have false positives
d. Intrusion detection only works in networking environment

B, C

3. Which of the following is an example of an IDS?


a. Symantec antivirus
b. SNORT
c. SANS
d. Firewall

B.
Correct

4. Which of the following does not involve in an IT audit?


a. Evaluating the risk level of IT systems
b. Checking the IT system against baselines
c. Configuring Firewall to prevent unauthorized access
d. Measuring the system against set standards

C.

5. Which of the following exploits human weaknesses and trick people to reveal confidential
information?
a. Physical security testing
b. Web application security testing
c. Social engineering
d. Application security testing

Knowledge Quiz 1 Version: 1.0 – 22-April-2016 – Current Page 2 of 5


Knowledge Quiz 1
Correct

6. Which of the following is a networking protocol?


a. HTTP
b. UDP
c. SSL
d. Web 2.0

B
Correct

7. Which of the following is a security protocol?


a. HTTP
b. UDP
c. SSL
d. Web 2.0

C
Correct

8. In less no more than 50 words, explain what single sign-on (SSO) systems are.

Single sign-on (SSO) is a session and user authentication service it give permission to client to use one set
of login credentials.
http://searchsecurity.techtarget.com/definition/single-sign-on

9. What is the goal of encryption?


a. Ensuring availability of data
b. Ensuring integrity of data
c. Ensuring validity of data
d. Ensuring confidentiality of data

D.
Correct

10. What is the difference between bandwidth and quality of service?

Bandwidth describes the maximum data transfer rate of a network or Internet connection and quality of
service (QoS) prioritizes traffic by type so the really important stuff gets the bandwidth it needs to cross
the network unimpeded by the unimportant stuff.

Correct

11. Describe two factors that may affect signal quality in a wireless network.

1. Physical objects: Trees, masonry, buildings, and other physical structures are some of the most
common sources of interference.
2. Environmental factors: Weather conditions can have a huge impact on wireless signal integrity.
Lightning, rain, etc.

Knowledge Quiz 1 Version: 1.0 – 22-April-2016 – Current Page 3 of 5


Knowledge Quiz 1
Correct

12. Layer 2 of the OSI model is responsible for physical addressing, and Layer 3 is responsible for
logical address. Therefore, which layer would you need to consider when you are designing VLANS
by using IP Addresses?

Layer 3
Correct

13. If you were required to implement a SOHO wireless network, which of the following range of
wireless equipment would you recommend?
a. Entry level WiFi router with standard features
b. Medium business level WiFi router with features that can handle heavier workloads and
access
c. Enterprise level WiFi router with advanced features and security

- Medium business level WiFi router with features that can handle heavier workloads and
Access.

14. Which of the following is suitable for WiFi security in a SOHO?


a. Wired Equivalent Privacy
b. Wi-Fi Protected Access
c. Wi-Fi Protected Access 2

C.
Correct

15. Which of the following is suitable for WiFi security at home?


a. Wired Equivalent Privacy
b. Wi-Fi Protected Access
c. Wi-Fi Protected Access 2

C.
Correct

16. The following are two wireless network topologies.


a. What are they called?
b. Which one is more suitable for a SOHO?

Network 1

Knowledge Quiz 1 Version: 1.0 – 22-April-2016 – Current Page 4 of 5


Knowledge Quiz 1
Network 2

a) Point to multipoint topology – Network1


Ring topology – Network2
b) Point to multipoint topology

17. In no more than 50 words each, describe the following.


a. TCP protocol

Transmission Control Protocol is a standard that defines how to establish and maintain a network
conversation via which application programs can exchange data.
http://searchnetworking.techtarget.com/definition/TCP-IP

b. IP protocol

The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on
the Internet.
http://searchnetworking.techtarget.com/definition/TCP-IP

End of assessment.

Knowledge Quiz 1 Version: 1.0 – 22-April-2016 – Current Page 5 of 5

You might also like