0% found this document useful (0 votes)
29 views4 pages

Networks Questions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views4 pages

Networks Questions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

EDEXCEL OL

Networks - Edexcel test questions


1
What is a network?
a) Two or more computers/devices connected together for the purpose of communicating
b) A standalone computer/device
c) Two or more computers/devices working in tandem
2
What is a LAN?
a) Large area network
b) Large arrayed network
c) Local area network
3
What is a server?
a) A server is a computer that stores files and/or provides other services to a network
b) A computer that is connected to the internet
c) A collection of high speed computers
4
What is an advantage of using fibre-optic cables over copper wires?
a) Fibre-optic cables cost less than copper wires
b) Fibre-optic cables have a higher bandwidth than copper wires
c) Fibre-optic cables are more flexible than copper wires
5
Which of the following statements is a disadvantage of using a wireless connection?
a) Limited connection range
b) Freedom of movement
c) Users cannot share files
6
What is the difference between a hub and a switch?
a) A hub broadcasts a message across the whole network, whereas a switch sends the
message to the intended recipient only
b) A switch broadcasts a message across the whole network, whereas a hub sends the
message to the intended recipient only

Ms. Sandamali Ekanayake [BSc.(Hons) in Computing & IS - UK]


EDEXCEL OL

c) A hub broadcasts a message across the whole network, whereas a switch sends data
signals across the internet
7
What is a WAN?
a) Wide area network
b) Wireless area network
c) Windows area network

8
What is a set of rules that governs transmission of data known as?
a) Server
b) Topology
c) Protocol
9
Which topology has only one cable and uses terminators?
a) Star
b) Bus
c) Mesh
10
What topology is the internet?
a) Partially connected mesh
b) Star
c) Fully connected mesh

Ms. Sandamali Ekanayake [BSc.(Hons) in Computing & IS - UK]


EDEXCEL OL

Network and cybersecurity - Edexcel test questions


1
What does access control do?
a) Access control determines what packets are allowed access to a network
b) Access control determines the facilities a user can access on a network
c) Access control stops social engineering attacks
2
What is shoulder surfing?
a) Shoulder surfing is the act of gaining information by directly observing someone
b) Shoulder surfing is the act of using unpatched software to gain access to a network
c) Shoulder surfing is the act of using a malicious USB device to gain information
3
Which type of threat uses emails to try to trick users into giving away personal details?
a) Phishing
b) Unpatched software
c) Data interception
4
What is eavesdropping?
a) Eavesdropping is the act of gaining information by directly observing someone
b) Eavesdropping is where a hacker intercepts information being sent to or from a network
to a device or another network
c) Eavesdropping involves using penetration testing to secure a network
5
Which preventative measure probes for weaknesses in a network?
a) Network policies
b) Network forensics
c) Penetration testing
6
What is a code review?
a) Code reviews are automated testing of code quality
b) Code reviews are checks of source code by other experienced programmers to check that
no security issues have been created
c) A code review is a record of what has been done and who or what did it

Ms. Sandamali Ekanayake [BSc.(Hons) in Computing & IS - UK]


EDEXCEL OL

7
Which of the following tools stops unauthorised traffic from entering and leaving a network?
a) Anti-malware
b) Network forensics
c) Firewall
8
Which of the following terms describes testing sections of code to ensure they work as
expected and do not contain security issues?
a) Modular testing
b) Penetration testing
c) Access control
9
What is unpatched software?
a) Software that is constantly updated with bug fixes
b) Software that is vulnerable to being hacked
c) Software that has built-in security
10
What term describes a copy of important files kept separately in case original files are lost or
damaged?
a) Backup
b) Network policy
c) Access control

Ms. Sandamali Ekanayake [BSc.(Hons) in Computing & IS - UK]

You might also like