NSS
Network Systems Security Quiz
Test your knowledge and understanding of network systems and security protocols with our comprehensive quiz.
Covering a variety of topics, this quiz will help you:
- Understand key networking concepts
- Learn about various protocols and systems
- Expand your knowledge in cybersecurity and network management
What is a baseline?
The average access speed of a network drive
The average access speed of a local drive
Describes the normal status on a network, and provides a reference point
None of the above
Which is not one of the five audit types listed in lecture two?
Research
Inventory
Security
Operational
What type of audit describes what is normal for any given network?
Inventory
Operational
Security
Research
What does EMI stand for?
Enhanced Magnetic Imaging
Enhanced Memory Interface
Electromagnetic Interference
Enhanced Machine Interface
What does RFI stand for?
Remote File Index
Redundant File Image
Radio Frequency Interference
Remote File Intercept
What does SOAP stand for?
Serial Object Access Protocol
Standard Object Access Protocol
Standard Out Access Protocol
Simple Object Access Protocol
What does NFS stand for?
Network File System
New File System
New technology File System
Network Folder System
What does RFC stand for?
Remote File Compare
Request for Comments
Remote File Control
Remote File Checksum
What does CIFS stand for?
Computer Internet File System
Compact Internet File System
Common Internet File System
Cisco Internet File System
What is SMB the same as?
NFS
NTFS
CIFS
NSF
What does SMB stand for?
Sender Message Block
Server Message Block
Sequential Message Block
SAMBA Message Block
What is SAMBA?
NFS Protocol
A PCL Protocol
A Mail Protocol
SMB / CIFS Network Protocol
What is smbd?
A daemon that allows file and print sharing on an SMB network
A daemon that allows Microsoft to access NFS shares
A daemon that looks after the Windows Internet Name Service
A daemon for simple mail binding
What is nmbd?
A daemon that allows file and print sharing on an SMB network
A daemon that looks after the Windows Internet Name Service
A daemon that allows Microsoft to access NFS shares
A daemon for network mail binding
What does SFU stand for?
File Mitigation Utility
System Format Utility
Service For Unix
Sequential File Update
What does SAN stand for?
Serial Access Network
Sequential Access Network
Standard Access Network
Storage Area Network
What does NAS stand for?
Network Attached Storage
Network Access Storage
Network Available Storage
New Access Storage
What does DAS stand for?
Direct Attached Storage
Distributed Access Storage
Disk Access Storage
Duplex Access Storage
What are three elements of network management as stated in the slides?
Security, Performance, Reliability
Security, Redundancy, Reliability
Fault Tolerance, Performance, Recursion
None of the above
What does SCSI stand for?
Serial Communication System Interface
Small Computer System Interface
Standard Computer System Interface
Sequential Communications System Interface
What is Fibre Channel?
The bus that connects the CPU to Memory
A fibre Optical only bus
A bus on the motherboard that has higher performance then PCIe for connecting video cards
Is a technology for transmitting data between computer devices
What is iSCSI?
Internal SCSI drives
Intermediate SCSI
SCSI over an IP network
A SCSI system that uses SATA Internal drives
What is the difference between Postscript and PCL?
Postscript was developed initially by Adobe
Postscript was developed initially by HP
PCL was developed initially by Adobe
PCL was developed initially by Apple
What is a WinPrinter?
The Windows Printer queue
A printer designed only for network printing
Printer that usually only comes with a Windows driver
A printer that has Microsoft Windows running internally on it
What does CUPS stand for?
Common Unix Printer Specification
Common UNIX Printing System
Common UNIX Printer Standard
None of the above
What is Raster Graphics?
Bitmapped graphics
Mathematically generated points, lines, and shapes
What is Vector Graphics?
Bitmapped Graphics
Mathematically generated points, lines, and shapes
What does BIND stand for?
Berkeley Information Name Domain
Berkeley Internet Network Domain
Berkeley Internet Name Domain
Berkeley Information Network Domain
What is a purpose of using a PROXY server?
Only ever improves performance
Improve performance, Filter request
Only ever filters requests
None of the above
What is a FIREWALL?
A wall surrounding a server room to prevent an internal fire from escaping
A system designed to prevent authorized packets from being viewed
A system designed to prevent unauthorized packets from being returned to the sender
A system designed to prevent unauthorized access to or from a private network
Which is not a techniques used by firewalls.
Packet Filter
Application Gateway
Forced Firewall
Stateful Inspection
What is IP spoofing?
Modifies packet headers so that the packet appears to be coming from a trusted host
Uses IPX to emulate an IP network
Allows IPV6 packets to transfer on an IPV4 network
None of the above
What does DMZ stand for?
Device Management Zone
Demilitarized Zone
Dual Media Zone
Detached Management Zone
What is a gateway?
Links two different types of networks
Links two identical networks
Links one internal site to many external destinations of identical networks
None of the above
What is an Extranet?
A private network internal only to your organization
Connects two or more trading partners
The World Wide Web
Your organizations network spanning two or more geographical areas
What does XML stand for?
Extensible Markup Language
Extended Machine Language
Cross Machine Language
Extended Markup Language
What does LDAP stand for?
Lightweight Domain Access Protocol
Lightweight Directory Address Protocol
Lightweight Directory Access Protocol
Lightweight Domain Address Protocol
What does ADSL stand for?
Asynchronous Digital Subscriber Line
Asymmetric Digital Subscriber Line
Advanced Digital Subscriber Line
None of the above
What does IMAP stand for?
Information Management Access Protocol
Intranet Message Access Protocol
Instant Message Access Protocol
Internet Message Access Protocol
What is the difference between Unicode and ASCII?
ASCII uses 8 bits and Unicode uses 16 bits
Unicode uses 8 bits and ASCII uses 16 bits
ASCII uses 7 bits and Unicode uses 8 bits
ASCII uses 8 bits and Unicode uses 7 bits
What does MIME stand for?
Multimedia Extensions
Multipurpose Internet Mail Extensions
Microsoft Information Media Extensions
Multimedia Information Mail Extensions
What does SMTP for?
Simple Mail Transfer Protocol
SendMail Transport Protocol
Snail Mail Transport Protocol
Standard Mail Transfer Protocol
What does MTA stand for?
Message Transfer Agent
Mail Transfer Agent
MIME Transport Agent
Mail Transcript Authentication
What is an example of a MTA?
Microsoft Windows
CISCO Switch
Microsoft Exchange Server
Outlook
What is an example of a MUA?
Microsoft Windows
Microsoft Exchange Server
CISCO Switch
Outlook
What is the difference between a Manager and an Agent?
Agents Poll Managers
Managers Poll Agents
What does MIB stand for in the context of our course?
Message Information Block
Mail Information Block
Management Information Database
None of the above
What are management Proxies?
Allows managers access to network resources that regular user cant access
Allows you to access the Internet from a computer without Internet access
Blocks users from access to management information
Provides management information on behalf of other entities
What does SNMP stand for?
Simple Network Management Protocol
Simple Network Mail Protocol
Standard Network Mail Protocol
Standard Network Management Protocol
Why would you do a network audit?
To determine if a network cable is missing
Define what is normal, so one knows when something abnormal occurs
With redundancy, network audits are no longer required
To determine if a network cable is missing
{"name":"NSS", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge and understanding of network systems and security protocols with our comprehensive quiz. Covering a variety of topics, this quiz will help you: Understand key networking concepts Learn about various protocols and systems Expand your knowledge in cybersecurity and network management","img":"https:/images/course2.png"}
More Quizzes
Test 2 Part 1(revisit)
1586
Final 6
10545
Security Malware
105111
CCNA Security Chapter 18 - Mitigation Technologies for E-mail- Based and Web-Based Threats
840
Security - take the quiz
432242
Incident Handling Part 2
13610
I would like the quiz to test the participants in a workshop about modern Cybersecurity Operation Centers Building blocks, Architecture, Main services, the importance of Cyber Threat Intelligence, CTI lifecycle, CTI types (Strategic, Tactical, technical and operational), CTI protocols, CTI open source feeds, CTI opensource and online platforms - take the quiz
8462
CCNA Security Chapter 17 - Cisco IDS/IPS Fundamentals
1160
2019 PCI OWASP Top Ten Quiz
12632
Directory and Files Discovery
320
Secure Application Development Quiz
11619
Secure Application Development Quiz
11626