JumpStart – Computer Network Skills Check 1
Read the questions carefully. Feel free to use a notepad to work out your answers. When you think you know the answer, click on the appropriate selection, then click on the Next button.
Skills Check Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the skills check before. Hence you can not start it again.
Skills Check is loading…
You must sign in or sign up to start the skills check.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Computer Networks 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
What option can be used to have Ping resolve a hostname?
-
Question 2 of 20
2. Question
What is the fastest network speed that Fiber has reached experimentally?
-
Question 3 of 20
3. Question
Which of these commands are the same in windows and linux?
-
Question 4 of 20
4. Question
What CLI command is used to clear the terminal in windows?
-
Question 5 of 20
5. Question
Which is NOT an attribute of TCP?
-
Question 6 of 20
6. Question
What acronym is used for Network Basic Input/Output System?
-
Question 7 of 20
7. Question
HTTPS uses:
-
Question 8 of 20
8. Question
What command can copy a file in windows?
-
Question 9 of 20
9. Question
What can be defined as the path related to the present working directory(pwd)?
-
Question 10 of 20
10. Question
What is a type of network connectivity?
-
Question 11 of 20
11. Question
What is a computer network?
-
Question 12 of 20
12. Question
Which protocol is used primarily for email?
-
Question 13 of 20
13. Question
What CLI command works by sending Internet Control Message Protocol (ICMP) echo Request messages?
-
Question 14 of 20
14. Question
Which protocol assigns IP addresses?
-
Question 15 of 20
15. Question
Which protocol is used primarily for insecure web browsing?
-
Question 16 of 20
16. Question
Which is an attribute of UDP?
-
Question 17 of 20
17. Question
Which protocol is used to secure web traffic?
-
Question 18 of 20
18. Question
Using the internet, research the following: Who typically defines the mac address?
-
Question 19 of 20
19. Question
Which is a proper MAC address?
-
Question 20 of 20
20. Question
Computers use ________ which are common communication standards over digital communication mediums in order to communicate with each other.