Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Take the Basic Networking and Cybersecurity Knowledge Quiz

Enhance Your IT Security and Networking Skills

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art representing a quiz on basic networking and cybersecurity knowledge.

Ready to explore your understanding of basic networking and cybersecurity? This Basic Networking Knowledge Test pairs perfectly with our Cybersecurity Knowledge Assessment Quiz to challenge your IT fundamentals. Ideal for students and professionals seeking to gauge their skills, this quiz can be freely modified in our editor to suit any learning goal. Dive into hands-on scenarios, evaluate your responses, and unlock insights for secure network design. Start exploring more quizzes today and boost your confidence!

What network topology connects all nodes to a central hub?
Star
Bus
Ring
Mesh
In a star topology, all devices connect to a central hub or switch which manages communication. This contrasts with bus or ring topologies where devices share a common medium or connect in a loop.
Which protocol is primarily used to send email between servers?
SMTP
HTTP
FTP
DNS
SMTP (Simple Mail Transfer Protocol) is the standard protocol for sending email between mail servers on port 25. HTTP handles web traffic, FTP handles file transfers, and DNS resolves domain names.
What device monitors and controls incoming and outgoing network traffic based on security rules?
Firewall
Router
Switch
Modem
A firewall enforces security policies by inspecting and filtering traffic according to defined rules. Routers direct packets, switches forward frames, and modems convert signals without filtering based on security criteria.
Which of the following is an example of strong password practice?
Use a mix of uppercase, lowercase, numbers, and symbols
Use "password123"
Use your birthdate
Use only lowercase letters
Combining uppercase, lowercase, numbers, and symbols increases password complexity and resistance to brute-force attacks. Simple or common patterns like "password123" are vulnerable and easily guessed.
What type of malware replicates itself to spread to other computers without user intervention?
Worm
Trojan
Adware
Spyware
A worm is self-replicating malware that propagates across networks without requiring user action. Trojans disguise themselves as legitimate software, while adware and spyware do not self-replicate.
Which protocol uses TCP port 443 for secure web traffic?
HTTPS
HTTP
SSH
Telnet
HTTPS runs HTTP over TLS/SSL on TCP port 443 to encrypt web traffic. HTTP uses port 80, SSH uses port 22 for secure shell access, and Telnet uses port 23 without encryption.
In IP addressing, what does DHCP provide to hosts?
IP addresses and configuration
Encryption keys
Domain names
Routing information only
DHCP automatically assigns IP addresses and network configuration parameters (subnet mask, gateway, DNS) to hosts. It does not distribute encryption keys or domain names directly.
What is the primary purpose of a VLAN?
Segment broadcast domains within a switch
Encrypt traffic
Filter packets
Route between networks
A VLAN (Virtual LAN) partitions a physical switch into separate broadcast domains, improving performance and security. It is not inherently an encryption, packet-filtering, or routing mechanism.
Which encryption algorithm is symmetric?
AES
RSA
DSA
ECC
AES (Advanced Encryption Standard) uses the same key for encryption and decryption, classifying it as symmetric. RSA, DSA, and ECC are asymmetric algorithms that use key pairs.
Which port is associated with DNS?
53
25
80
110
DNS uses port 53 for queries over UDP and TCP. Port 25 is SMTP for email, 80 is HTTP for web traffic, and 110 is POP3 for retrieving email.
A stateful firewall primarily differs from a stateless firewall by:
tracking connection states
filtering only by IP address
only blocking IP ranges
scanning for malware
Stateful firewalls maintain information about active connections and make decisions based on context, whereas stateless firewalls inspect each packet independently. This allows stateful devices to allow return traffic dynamically.
What tool is commonly used for packet capturing and analysis?
Wireshark
Nmap
Nessus
Burp Suite
Wireshark is a widely used network analyzer for capturing and inspecting packet data. Nmap is for port scanning, Nessus for vulnerability scanning, and Burp Suite for web application testing.
Which vulnerability allows attackers to execute code by injecting SQL commands?
SQL Injection
Cross-Site Scripting
Buffer Overflow
Man-in-the-middle
SQL Injection occurs when unsanitized user input is executed as part of a database query, leading to unauthorized data access or manipulation. The other options involve different attack vectors.
Which method helps prevent eavesdropping on Wi-Fi networks?
Enable WPA2 or WPA3 encryption
Disable SSID broadcast
Use MAC filtering
Set static IP addresses
WPA2 and WPA3 provide strong encryption for wireless communications, protecting against eavesdropping. Disabling SSID, MAC filtering, or static IP addresses offer minimal security and can be bypassed.
In network troubleshooting, which command tests the reachability of a host?
ping
traceroute
netstat
ipconfig
The ping command sends ICMP echo requests to a target host to verify network connectivity and measure response time. Traceroute shows the path hops but is not used solely for reachability testing.
During a firewall rule configuration, why is rule order important?
First matching rule is applied
Last matching rule is applied
Rules apply randomly
Only deny rules have priority
Firewalls process rules sequentially and enforce the first rule that matches the traffic. If a generic allow appears before a specific deny, unwanted traffic may pass. Proper ordering ensures policies behave as intended.
In a TLS handshake, which cryptographic method ensures integrity?
Hash-based message authentication code
Public key encryption
Symmetric encryption
Key exchange protocol
An HMAC (Hash-based Message Authentication Code) verifies message integrity by combining a hash with a secret key. Public key and symmetric encryption ensure confidentiality, while the key exchange sets up shared secrets.
Which issue is indicated by excessive retransmissions and high latency in packet captures?
Network congestion or packet loss
Malware infection
DNS poisoning
Open relay
High retransmissions and latency typically point to packet loss or congestion on the network path. This manifests as repeated sequence numbers and delayed acknowledgments in captures. Other issues show different patterns.
What type of VPN uses SSL/TLS to secure connections?
SSL VPN
PPTP
L2TP
IPSec VPN
SSL VPNs leverage the SSL/TLS protocols (commonly over HTTPS) to provide secure remote access. PPTP and L2TP use older tunneling methods, and IPSec VPNs rely on IPsec rather than SSL/TLS.
When evaluating a network for security best practices, which action helps reduce attack surface?
Disabling unused ports and services
Increasing DNS cache size
Enabling all protocols
Installing additional Bonjour services
Turning off unneeded ports and services removes potential entry points for attackers and adheres to least-privilege principles. Increasing DNS cache or adding services can introduce vulnerabilities rather than mitigate them.
0
{"name":"What network topology connects all nodes to a central hub?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What network topology connects all nodes to a central hub?, Which protocol is primarily used to send email between servers?, What device monitors and controls incoming and outgoing network traffic based on security rules?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Analyse network topologies and protocols.
  2. Identify common cybersecurity threats and vulnerabilities.
  3. Apply basic configuration principles for secure networks.
  4. Demonstrate understanding of firewall and encryption concepts.
  5. Evaluate security best practices for network protection.
  6. Master troubleshooting techniques for network security issues.

Cheat Sheet

  1. Understand Network Topologies - Dive into star, bus, and ring designs by imagining your network as a city map where each road style affects traffic flow and accident hotspots. Star topologies simplify troubleshooting but can crash the whole party if the central hub goes down, while ring and bus layouts each bring their own flair and quirks. Mastering these layouts is like picking the right game board - knowing the rules makes victory (and security) way more fun! Best Practices in Network Security
  2. Learn Key Network Protocols - Think of TCP/IP as the postal service of the internet, ensuring packets get where they need to go, and HTTP/HTTPS as the polite mailman who checks IDs at the door. When you know how these protocols talk, diagnose hiccups becomes a breeze and securing your data feels like locking your front door with a 5-digit code. It's the foundation that keeps the digital world running smoothly! Best Practices in Network Security
  3. Identify Common Cybersecurity Threats - From sneaky phishing emails that pretend to be your bank to malware that sneaks in like a ninja, understanding each threat is your superhero origin story. Spotting denial-of-service attacks is like realizing someone's flooding the streets to block traffic - once you know what to watch for, you can set up roadblocks before trouble starts. Learning these villains' moves is half the battle in crafting your digital defense squad! Network Security Threats Overview
  4. Implement Strong Password Policies - Encourage passwords that read like secret spells - mix letters, numbers, and symbols for maximum power and change them regularly to keep baddies guessing. A robust password policy is like having a Da Vinci-level vault on your data: break it and you'll need more than luck! Engaging users with fun tips (like passphrases from song lyrics) can turn security chore into a creative challenge. Top 10 Network Security Best Practices
  5. Regularly Update Software and Systems - Imagine leaving your castle gates open - outdated software is just that, handing attackers an open invitation. Automate updates so your defenses get the latest patching potions without you lifting a finger, keeping your kingdom ahead of evolving threats. A few clicks now save hours of scramble later! Keep Software Updated
  6. Utilize Firewalls and Intrusion Detection Systems (IDS) - Firewalls act like city walls, controlling who enters or exits, while IDS play lookout towers spotting suspicious moves. Combining both gives you a two-layered fortress: firewalls filter the crowd, and IDS shout out when someone's up to no good. Together, they're your dynamic duo against unwanted digital intruders! Firewalls & IDS Guide
  7. Apply Data Encryption Techniques - Encryption is the secret code that scrambles your messages into gibberish for anyone without the key - TLS/SSL for data on the move and AES for data at rest are your go-to spells. Even if cyber-thieves intercept your packets, they're left staring at nonsense. Think of it as sending invisible ink letters that only your intended recipient can read! Understanding Network Security Best Practices
  8. Implement Network Segmentation - Dividing your network into zones is like creating neighborhood watch blocks - if one area gets hit, the others stay safe and sound. By isolating sensitive data in its own "VIP section," attackers can't roam free across your entire network. It's a simple way to shrink your attack surface and keep the party in each zone under control! Network Segmentation Strategies
  9. Conduct Regular Security Audits - Treat security audits like routine health check-ups for your network, uncovering hidden vulnerabilities before they become emergencies. Scanning, testing, and reviewing configurations ensures that misconfigurations or outdated components don't sneak past your guard. Regular audits turn surprises into predictable fixes - your network's wellness plan! 10 Steps for Proper Network Security
  10. Educate Users on Security Best Practices - Your users are the first line of defense, so turn them into cyber-savvy heroes with engaging training on spotting phishing tricks, creating strong passwords, and embracing updates. Gamify the learning - quiz battles, badges, and rewards - to make security part of your team's daily adventure. An informed crew is your secret weapon against sneaky cyber threats! Common Network Security Strategies
Powered by: Quiz Maker