Module quiz: Network devices and protocols :Introduction to Networking and Cloud Computing (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. When joining networks and subnets, what is used to connect them?
✅ Router
❌ Switch
❌ Firewall
Explanation:
Routers connect different networks and subnets.
2. The TCP/IP application layer combines which OSI layers? (Select all)
✅ Application
❌ Internet
❌ (Not included)
✅ Session
✅ Presentation
Explanation:
The TCP/IP Application layer groups OSI layers 5, 6, and 7: Session, Presentation, Application.
3. Cloud setup using both private and public clouds
✅ Hybrid cloud
❌ Multi-cloud
❌ Cloud of clouds
❌ Cloud
4. VPN used to connect from home to the office network
✅ Remote
❌ Home
❌ Site-to-site
5. SMTP, IMAP, POP3 are protocols used in:
✅ Email
❌ Web browsers
❌ Remote connectivity
6. Best protocol for encrypted web content delivery
✅ HTTPS
❌ FTP
❌ FTPS
❌ HTTP
7. Secure browsing uses port 80 and unsecured uses 443.
❌ True
✅ False
Explanation:
HTTPS = 443 (secure)
HTTP = 80 (unsecure)
8. DNS is critical and vulnerable to attacks like hijacking/spoofing.
✅ True
❌ False
9. Traffic management mechanisms are part of which suite?
❌ Network availability
✅ Quality of Service (QoS)
❌ Metric analysis
10. findstr in Windows CMD helps filter log file searches.
✅ True
❌ False
🧾 SUMMARY TABLE
| Q# | Correct Answer | Key Concept |
|---|---|---|
| 1 | Router | Connects networks |
| 2 | Application, Session, Presentation | TCP/IP ↔ OSI mapping |
| 3 | Hybrid cloud | Private + public |
| 4 | Remote VPN | Connect from home |
| 5 | SMTP/IMAP/POP3 | |
| 6 | HTTPS | Secure web delivery |
| 7 | False | Correct port usage |
| 8 | True | DNS vulnerabilities |
| 9 | QoS | Traffic management |
| 10 | True | findstr log filtering |