Skip to content

Module quiz: Network devices and protocols :Introduction to Networking and Cloud Computing (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

1. When joining networks and subnets, what is used to connect them?

Router
❌ Switch
❌ Firewall

Explanation:
Routers connect different networks and subnets.


2. The TCP/IP application layer combines which OSI layers? (Select all)

Application
❌ Internet
❌ (Not included)
Session
Presentation

Explanation:
The TCP/IP Application layer groups OSI layers 5, 6, and 7: Session, Presentation, Application.


3. Cloud setup using both private and public clouds

Hybrid cloud
❌ Multi-cloud
❌ Cloud of clouds
❌ Cloud


4. VPN used to connect from home to the office network

Remote
❌ Home
❌ Site-to-site


5. SMTP, IMAP, POP3 are protocols used in:

Email
❌ Web browsers
❌ Remote connectivity


6. Best protocol for encrypted web content delivery

HTTPS
❌ FTP
❌ FTPS
❌ HTTP


7. Secure browsing uses port 80 and unsecured uses 443.

❌ True
False

Explanation:
HTTPS = 443 (secure)
HTTP = 80 (unsecure)


8. DNS is critical and vulnerable to attacks like hijacking/spoofing.

True
❌ False


9. Traffic management mechanisms are part of which suite?

❌ Network availability
Quality of Service (QoS)
❌ Metric analysis


10. findstr in Windows CMD helps filter log file searches.

True
❌ False


🧾 SUMMARY TABLE

Q# Correct Answer Key Concept
1 Router Connects networks
2 Application, Session, Presentation TCP/IP ↔ OSI mapping
3 Hybrid cloud Private + public
4 Remote VPN Connect from home
5 Email SMTP/IMAP/POP3
6 HTTPS Secure web delivery
7 False Correct port usage
8 True DNS vulnerabilities
9 QoS Traffic management
10 True findstr log filtering