Online Evaluation Exam 2:

0%

Online Test 2: Network Knowledge Assessment Test

Please enter your information below to start the Online Skills Assessment.

1 / 10

Which of the following is a technique used to secure network traffic by encrypting it?

2 / 10

Which of the following is a protocol used to dynamically assign IP addresses to network devices?

3 / 10

Which of the following is used at the edge of a network to help secure it?

4 / 10

Which of the following is a technique used to reduce network congestion by prioritizing certain types of traffic?

5 / 10

Which of the following is a protocol used to monitor network devices such as routers and switches?

6 / 10

Which of the following is not a technology used to connect devices over short distances using radio waves?

7 / 10

Which of the following is a networking device that connects multiple network segments together and forwards packets between them?

8 / 10

Which of the following is a method for authenticating users by verifying their identities through two or more factors?

9 / 10

Which of the following is a protocol used for secure communication over the internet?

10 / 10

Which of the following is a private IPv4 address?

0%