JumpStart – Computer Network Skills Check OLD 3
Skills Check Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the skills check before. Hence you can not start it again.
Skills Check is loading…
You must sign in or sign up to start the skills check.
You must first complete the following:
Results
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Computer Networks 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
RDP uses:
-
Question 2 of 20
2. Question
How many bits does an IPv4 address represent?
-
Question 3 of 20
3. Question
What command can copy a file in windows?
-
Question 4 of 20
4. Question
What is NOT a telecommunication network technology?
-
Question 5 of 20
5. Question
Which version of IP is the latest and is being adopted slowly?
-
Question 6 of 20
6. Question
Which protocol is used primarily for email?
-
Question 7 of 20
7. Question
Which protocol assigns IP addresses?
-
Question 8 of 20
8. Question
Using the internet, research the following: How many versions of IP are in use today?
-
Question 9 of 20
9. Question
Which of the following is NOT a type of network connectivity?
-
Question 10 of 20
10. Question
What is a type of network connectivity?
-
Question 11 of 20
11. Question
Which protocol is an internet standard protocol used to monitor and manage network devices.
-
Question 12 of 20
12. Question
Which protocol is used primarily for insecure web browsing?
-
Question 13 of 20
13. Question
Which is an attribute of UDP?
-
Question 14 of 20
14. Question
Using the internet, research the following: What is the maximum port range?
-
Question 15 of 20
15. Question
Which is a proper MAC address?
-
Question 16 of 20
16. Question
What is NOT a part of the CLI syntax?
-
Question 17 of 20
17. Question
Which protocol is used to secure web traffic?
-
Question 18 of 20
18. Question
Which is a proper MAC address?
-
Question 19 of 20
19. Question
What attribute is found in a long flag?
-
Question 20 of 20
20. Question
HTTP uses: