Summative Css 11 - 3
Summative Css 11 - 3
Department of Education
Western Visayas
Division of Sagay City
Objectives:
At the end of the test, students are expected to:
1. Read the instructions carefully and legibly answer the examination.
2. Display good disposition upon answering the examination.
TABLE OF SPECIFICATION
Cognitive Domain No. of
Items
Learning Competencies
Understanding
Remembering
Evaluating
Analyzing
Applying
Creating
Configure wireless settings in accordance Part I
(7,9,10
with manufacturer’s instructions, network
design, and end-user preferences.
TLE_IACSS9-12SUCN-If-j-IIa-e-35
Configure security/ firewall/advanced
Part I. (11, Part I. 15
settings in accordance with 12) (13, 14,
manufacturers instruction and end-user 15)
preferences . Part II.
1-10
TLE_IACSS9-12SUCN-If-j-IIa-e-35
TOTAL No. of ITEMS 25
Prepared by:
General Directions: Read the instructions carefully and answer it legibly. (Use the answer sheet provided to
you.)
Part I. Multiple Choice: Choose the letter of the correct answer. Write your answer beside the number.
1. Which of the following network that uses radio waves to connect devices such as laptops and mobile
phones to the Internet and to your business networks for its applications.?
a. Wired Internet Network c. Wireless LAN Network
b. Wired LAN Network d. All of the above.
2. This is a type of network that allows devices to stay connected to the network but roam untethered to
any wires.
a. Wired Network c. Wirelles Network
b. Mesh Network d. Host Network
3. The following are the benefits of a wireless network EXCEPT
a. Easy Set-up b. Vulnerability c. Mobility d. Cost
4. Which of the following devices are NOT common in a Client Network?
a. Phones b. Computer c. Tablets d. Sector
5. What type of devices are used in Mesh Network?
a. Ad-hoc b. Sector c. Hub d. UTP
6. Which of the following figure below that indicates Clients cannot connect to each other wirellessly?
a. c.
b. d.
Part II. TRUE OR FALSE: Write the word TRUE in the space provider if the statements are correct and
FALSE if it is not.
________1. A firewall is hardware or software that can help protect your PC from unauthorized users or
malicious software (malware).
________2. Running a firewall on each PC on your network won't help control the spread of malicious
software on your network.
________3. In order to provide the security you need, the Windows Firewall has a standard set of inbound
and outbound rules.
________4. These rules can't be configured so that they are specific
to: computers, users, programs, services, ports or protocols.
________5. In the Windows Firewall with Advanced Security, you can access all rules and edit their
properties.
________6. Connection security rules are used to secure traffic between two computers while it crosses the
network.
________7. Monitoring section shows only the active rules for the current network location.
________8. Unlike the inbound or outbound rules, which are applied only to one computer, connection
security rules require that both computers have the same rules defined and enabled.
________9.Windows Firewall with Advanced Security is a tool which gives you detailed control over the
rules that are applied by the Windows Firewall.
________10. Inbound rules are applied to the traffic that is coming from the network and the Internet to your
computer or device.