Online Test 2: Network Knowledge Assessment Test
Please enter your information below to start the Online Skills Assessment.
1 / 10
Which of the following is a technique used to secure network traffic by encrypting it?
2 / 10
Which of the following is a protocol used to dynamically assign IP addresses to network devices?
3 / 10
Which of the following is used at the edge of a network to help secure it?
4 / 10
Which of the following is a technique used to reduce network congestion by prioritizing certain types of traffic?
5 / 10
Which of the following is a protocol used to monitor network devices such as routers and switches?
6 / 10
Which of the following is not a technology used to connect devices over short distances using radio waves?
7 / 10
Which of the following is a networking device that connects multiple network segments together and forwards packets between them?
8 / 10
Which of the following is a method for authenticating users by verifying their identities through two or more factors?
9 / 10
Which of the following is a protocol used for secure communication over the internet?
10 / 10
Which of the following is a private IPv4 address?