Pre - Test Question
Pre - Test Question
Pre - Test Question
1. There are different types of network architecture. A point-to-point link is where each device is A
to all others via a link. A dedicated circuit is established across a B is known as a C network and a
packet-switched network is where data is D called packets or messages based on the E strategy.
circuit-switched
store-and-forward
directly connected
set of links
split into blocks
3. What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the
“s”)?
A. That the site has special high definition
B. That the site has a new version installed
C. That information entered into the site is encrypted
D. None of the above
5. Criminals access someone’s computer and encrypt the user’s personal files and data. The user is
unable to access this data unless they pay the criminals to decrypt the files. This practice is called
__________
A. Phishing
B. DDOS
C. Password Cracking
D. Ransomware
6. What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?
A. Keylogging
B. Phishing attacks
C. Packet sniffing
D. Not sure
7. You see a non-familiar face in the access-controlled areas of our office, the person does not have
the MGL ID/Visitor/Staff/Vendor tag with him. What would you do?
A. Ignore them as it is none of my business.
B. Be courteous. Ask if the person is lost and show the person around the premise.
C. Raise a security incident and go back doing your work
D. Escort the person to the security and raise a security incident
8. A vulnerability means an inherent weakness in the system. How have we reduced the
vulnerability of outside attacks to our network?
A. By using antivirus
B. By using firewalls
C. By implementing security policy
D. By installing a good router
It connects and covers the whole city. E.g. TV Cable connection over
PAN (Personal Area
the city
Network)
It spans a large geographical area, often a country or continent. The
LAN (Local Area
Internet is the largest WAN
Network)
It is a privately owned network that operates within and nearby a
MAN (Metropolitan Area
single building like a home, office, or factory
Network)
Let devices connect and communicate over the range of a person.
WAN (Wide Area
E.g. connecting Bluetooth devices.
Network)
All the nodes are connected using the central link. It is useful to
connect a smaller number of devices. If the main cable gets
damaged, it will damage the whole network.
All the nodes are connected to one single node known as the
central node. Easy to troubleshoot but if the central node fails the
complete network is damaged. Mainly used in home and office
networks.