0% found this document useful (0 votes)
304 views3 pages

VU23213 Assessment 1 v1.0

This document contains a quiz assessing knowledge of basic network concepts and protocols required for cyber security. The 10 multiple choice questions test understanding of topics like network vulnerabilities, addressing schemes, protocols, encryption standards, and common network commands.

Uploaded by

Ryan Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
304 views3 pages

VU23213 Assessment 1 v1.0

This document contains a quiz assessing knowledge of basic network concepts and protocols required for cyber security. The 10 multiple choice questions test understanding of topics like network vulnerabilities, addressing schemes, protocols, encryption standards, and common network commands.

Uploaded by

Ryan Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

22603VIC – Certificate IV in Cyber Security

VU23213 Utilise basic network concepts and protocols required in cyber security

Assessment Task 1 – Quiz

1. Which of the following cyber security vulnerabilities are related to network security?
(Place the word “Yes” in the Your Response column next to all that apply)

Vulnerability Your Response


An open port on a firewall allows an attacker to gain access to the
organisation’s systems.
Malicious insider can copy confidential workplace information from their
PC to a USB stick.
Employee can complete a form on a website that is not protected by SSL
or TLS encryption.
The Cyber Security Policy does not require IT staff to change the default
password when installing a Wireless Access Point.
No record is maintained of employees participating in cyber security
awareness training.
Employees are allowed to work from home on their personal laptop
without being required to install anti-virus software.
Users are not required to connect to the organisation’s VPN before
signing-on to Microsoft Remote Desktop while working from home.

2. Which of the following statements is correct?


(Place the word “Yes” in the Your Response column next to the correct statement)

Statement Your Response


Cyber security is a subset of network security.
Network security is a subset of cyber security.
Network security is another name for cyber security.
Network security and cyber security are unrelated.

3. Complete the following table

Question Your Response


How many unique digits exist in the binary numbering system?
How many unique digits exist in the hexadecimal numbering system?
Name the numbering system represented by the notation 0x
How many binary digits exist in one bit?
How many binary digits exist in one byte?
Using binary numbering, how many unique values (permutations) can be
represented within one byte?
How many binary digits can be represented by one hexadecimal digit?
What symbols are used to represent the values between 10 and 16
(inclusive) in the hexadecimal numbering system?
4. Complete the following table for each Address shown in the first column

Written Assessment Template v1 June 2022

22603VIC VU23213 Assessment Task 2 v1.0 November 2022 Page 1 of 3


Address Address Scheme Number of bits in the
(IPv4 or IPv6) address
::1234:5678
192.168.0.1

5. How many unique host addresses are available on the subnet 192.168.0/24?

Enter response here:

6. What is the default subnet mask for a Class B IPv4 address?

Enter response here:

7. Complete the following table to identify which protocols belong to the TCP/IP
protocol suite:

Protocol
TCP/IP Suite?
Yes / No
SMTP
PHP
Named Pipes
UDP
eDirectory
IP
X.25
POP3

8. What is the main purpose of SMB in local area networks?


(Place the word “Yes” in the Your Response column next to the correct statement)

Statement Your Response


Translating an IP address to a MAC address.
Publishing secure message banners on the firewall.
Enabling the transfer of files between hosts.
Signalling the number of megabytes left in the current
transmission.

9. Which of the following Wi-fi encryption protocol provides a higher level of security?
- Wired equivalent privacy (WEP), or

Written Assessment Template v1 June 2022

22603VIC VU23213 Assessment Task 2 v1.0 November 2022 Page 2 of 3


- Wi-fi protected access (WPA)

Enter response here:

10. True or false: When running the PING command, a response of “destination host
unreachable” proves that the remote server is offline.

Enter response here:

Written Assessment Template v1 June 2022

22603VIC VU23213 Assessment Task 2 v1.0 November 2022 Page 3 of 3

You might also like