Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore 2ndQTRSUMMATIVE-TEST-ICT10

2ndQTRSUMMATIVE-TEST-ICT10

Published by ODY LAVARIAS, 2021-12-04 07:53:20

Description: 2ndQTRSUMMATIVE-TEST-ICT10

Search

Read the Text Version

QUALITY FORM Document Code: BTN-SSCLD-300707-QF-TS-003 SUMMATIVE TEST Control No: 001TLE Revision: 00 Effectivity date: 03-29-2019 Name of School: LIMAY NATIONAL HIGH SCHOOL ICT GRADE 10 SY 2021-2022 2nd Quarter NAME:____________________________ DATE: _______________________________ YEAR&SEC.:______________________ PARENT’S SIGNATURE:__________________ I. MULTIPLE CHOICE: Select & write the letter of the correct answer on the blanks provided for. ______1. Which of the following are sets of rules governing communication within and between computers on a network? a. IP address b. Internet Protocols c. Policies d. System Network ______2. Which of the following protocols used to network Macintosh computers? a. Apple b. Apple System c. Apple Talk d. Apple Zeus ______3. Which of the following protocols is an application used to connect to remote computer that lacks security features? a. Apple Talk b. HTTP c. SSH d. Telnet ______4. Which of the following protocols used for primarily on small windows NT network? a. HTTP b. NetBEUI c. POP3 d. SSH ______5. What is the term use to identify a device on a network? a. Internet Protocol b. IP address c. IP config d. Ping ______6. Which of the following is not included? a. 1st Octet b. 2nd Octet c. 4th Octet d. 5th octet ______7. Which classes of IP address used for large networks, implemented by large companies and some countries? a. Class A b. Class B c. Class C d. Class D ______8. Which classes of IP address used for experimenting testing? a. Class A b. Class B c. Class D d. Class E ______9. Which of the following indicates the network portion of an Ip address? a. Class A b. Ip Config c. Ping Command d. Subnet Mask ______10. Which of the following command used to find out the IP address of a certain network you are connected to.? a. Exit b. CTRL + N c. Ipconfig d. Ping Command ______11. Which types of security events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring.? b. Accidental b. Data c. Malicious d. Physical ______12. Which types of security events or attacks that remove, corrupt, deny access to, allow access to, or steal information? a. Accidental b. Data c. Malicious d. Physical ______13. Which types of security events or attacks which employees who have access to data, equipment, and the network c. Internal a. Accidental b. External d. Physical

______14. Which types of security events or attacks which employee’s employee intends to cause damage.? a. Accidental b. Data c. Malicious d. Physical ______15. Which of the following is a planned system of working to prevent illness and injury where you work by recognizing and identifying hazards and risks? a. DHCP b. Fire Exits c. OSH d. VPN ______16. Which of the following document that records the procedure adopted and results obtained from a scientific or technical activity or investigation.? a. Accidental Report b. Fire Exit Reports c. OSH d. Technical Report ______17. Which of the following document are used to give specific details with regards to accidents that happened in the laboratory during experiments.? a. Accidental Report b. Fire Exit Reports c. OSH d. Technical Report ______18. Which term defines sharing of or offering access to digital information or resources? a. Client/Server b. File Sharing c. Peer to Peer d. Printer Sharing ______19. Which of the following is an enhanced encryption protocol combining a 104- bit key and a 24-bit initialization vector? a. LEAP b. WEP 64 c. WEP 128 d. WPA ______20. Which of the following provide security form network intrusions, hackers and any form of cyber-attacks? a. Anti-Virus b. IP protocol c. Network Security d. OSH II. TRUE or FALSE: Write TRUE if the statement is correct then FALSE if otherwise. Write your answer on the blanks provided for ______21. Everyone in an organization should give high priority to security because everyone can be affected by a lapse in security. ______22. Damage or loss of equipment can mean a loss of productivity. ______23. Unauthorized use of a network can expose confidential information and reduce network resources. ______24. Windows firewall can infect a computer and lay dormant until summoned by the attacker. ______25. Security plan policies should be constantly updated to reflect the latest threats to a network. ______26. When installing wireless services, you should apply the following wireless security techniques immediately to prevent unwanted access to the network. ______27. Sharing a single printer among a group of users costs much less than buying a printer for each computer. ______28. The Ipconfig is a Command Prompt command used to test the ability of the source computer to reach a specified destination computer. ______29. The ping command is usually used as a simple way to verify that a computer can communicate over the network with another computer or network device. ______30. Ping is one of your most important tools in troubleshooting Internet problems. ______31. In Peer-to-Peer Network, It allows certain files and folders to be shared with everyone or with selected users. ______32. In a client/server model, the servers are maintained by IT Students. ______33. A client/server network, Network users with the proper permissions can access both the data and shared printers. QF - Page 2 of 4

______34. One example of a peer-to-peer network is a corporate environment in which employees use a company e-mail server to send, receive, and store e-mail. ______35. Peer-to-peer networks are quite common in small offices that do not use a dedicated file server. III. MATCHING TYPE: Match Column A to Column B. Write your answer on space provide for. Column A Column B ______36. World Wide Web a. TCP/IP ______37. Allows multiple simultaneous connections to remote file b. IPX/SPX systems. c. HTTP ______38. Used to securely connect to a remote computer d. Data Encryption ______39. Dominant protocol for standard for internetworking. e. FTP ______40. Originally employed by Novell Corporation’s network f. SSH operating system, NetWare. g. IMAP ______41. Used to download e-mail from a remote mail server h. External ______42. Dynamically assign IP addresses to network devices. ______43. stating that employees are not permitted to install any i. DHCP software that is not provided by the company. j. Virus ______44. encryption system that protects data as though it resides k. Unstructured attack on a private network. ______45. Users outside an organization who do not have authorized l. Structured attack m. Security Policy access to the network or resources. n. VPN ______46. They are created with malicious intent and sent by o. Security Plan attackers ______47. Determine what will be done in a critical situation. ______48. Use code to access operating systems and software. ______49. It prevents attackers from monitoring or recording traffic between resources and computers. ______50. Use available resources, such as passwords or scripts, to gain access to and run programs designed to vandalize Prepared by: TERESITA C. ISIP/ODY V. LAVARIAS ICT Teachers Noted: EDGARDO E. ORDIALES HT-III, TLE Department QF - Page 3 of 4


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook