KEMBAR78
Network and Security Exercise Fix | PDF | Computer Network | Computer Security
0% found this document useful (0 votes)
35 views2 pages

Network and Security Exercise Fix

The document consists of exercises assessing knowledge on networking concepts, including true/false statements and multiple-choice questions. Topics covered include types of networks, network security, TCP/IP, and various cyber threats. Additionally, it includes discussion prompts for group work on network vulnerabilities and protective measures against attacks.

Uploaded by

Dipa Rama ilhami
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views2 pages

Network and Security Exercise Fix

The document consists of exercises assessing knowledge on networking concepts, including true/false statements and multiple-choice questions. Topics covered include types of networks, network security, TCP/IP, and various cyber threats. Additionally, it includes discussion prompts for group work on network vulnerabilities and protective measures against attacks.

Uploaded by

Dipa Rama ilhami
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Exercise I.

Write T if the statement is TRUE, write F if the statement is FALSE

1. ….. Networking refers to the interconnection of computers, servers, and other devices to
share resources and exchange information.

2. ….. A Local Area Network (LAN) covers a large geographic area like the internet.

3. ….. Wide Area Networks (WANs) are restricted to small offices or homes.

4. ….. Wireless networks rely on physical cables to transmit data between devices.

5. ….. Routers, switches, and modems are essential components in networking.

6. …… The Transmission Control Protocol/Internet Protocol (TCP/IP) ensures efficient data


transmission between devices.

7. ….. Network security is not necessary as long as a network is properly set up.

8. ….. One of the goals of network security is to prevent identity theft and financial losses.

9. ….. Phishing attacks attempt to obtain sensitive information by impersonating trusted


entities.

10. ….. A Distributed Denial of Service (DDoS) attack attempts to speed up network performance.

Exercise II. Choose the correct answer

1. What is the primary purpose of networking?

A) To connect multiple devices for resource sharing and communication


B) To install antivirus software on computers
C) To prevent cyber threats and attacks
D) To create offline backups of data

2. Which type of network is limited to a small geographic area, such as an office or home?

A) Wide Area Network (WAN)


B) Metropolitan Area Network (MAN)
C) Local Area Network (LAN)
D) Wireless Network

3. What does TCP/IP stand for?

A) Transmission Control Protocol/Internet Protocol


B) Technical Communication Protocol/Internal Processing
C) Telecommunication Control Path/Internet Processing
D) Transport Command Protocol/Intelligence Processing

4. Why is network security important?

A) To improve internet speed


B) To prevent unauthorized access, cyberattacks, and data breaches
C) To increase the range of wireless networks
D) To reduce the cost of networking devices
5. Which of the following is NOT a common network security threat?

A) Malware attacks
B) Phishing attacks
C) VPN tunneling
D) DDoS attacks

6. What is a DDoS attack?

A) A type of virus that corrupts files


B) An attempt to overload a network with excessive traffic to disrupt services
C) A secure method of encrypting network data
D) A firewall used to prevent cyberattacks

7. How do firewalls contribute to network security?

A) By creating secure tunnels for internet traffic


B) By acting as barriers that filter incoming and outgoing network traffic
C) By physically disconnecting networks from the internet
D) By encrypting all stored data on a network

8. What is the purpose of encryption in network security?

A) To delete unnecessary files from the network


B) To ensure only authorized users can access encoded data
C) To improve internet speed
D) To allow any user to access network data freely

9. Which of the following is an example of an access control technique?

A) Firewalls
B) Multi-factor authentication (MFA)
C) DDoS mitigation
D) Data encryption

10. What does a Virtual Private Network (VPN) do?

A) It speeds up internet connections


B) It provides an unencrypted pathway for network communication
C) It creates a secure and encrypted tunnel for internet traffic
D) It disables access to the internet

Exercise III. Group work discussion

1. Among the different types of networks (LAN, WAN, MAN, Wireless), which do you think is most
vulnerable to security threats? Justify your answer with examples.

2. If you were an IT security manager, what steps would you take to protect a company's network
from phishing attacks and malware?

You might also like