Chapter 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

________ is the amount of data that can be transmitted across a transmission medium measured in bits per second. A) Data capacity B) Scalability C) Bandwidth D) Infusion

Bandwidth

Which of the following is NOT a factor to consider when selecting network cabling? A) Cable diameter B) Interference C) Maximum run length D) Bandwidth

Cable diameter

A(n) ________ address is the address that external entities use when communicating with your network. A) ALU B) MAC C) WAP D) IP

IP

The computers in a lab on a floor of a building would be connected using a ________. A) WAN B) LAN C) MAN D) PAN

LAN

For business networks, which of the following is NOT one of the main cable types? A) Twisted-pair B) Polyvinyl C) Coaxial D) Fiber-optic

Polyvinyl

A ________ uses the Internet communications infrastructure to build a secure and private network. A) PAN B) WAN C) VPN D) HAN

VPN

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. A) application B) authentication C) dedicated D) file

authentication

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall. A) transitional B) iron-clad C) bastion host D) proxy

bastion host

A ________ sends data from one collision domain to another. A) switch B) bridge C) link D) router

bridge

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. A) hit B) crash C) stop D) jam

jam

The physical address assigned to each network adapter is called its ________ address. A) network access control (NAC) B) physical address control (PAC) C) network physical address (NPA) D) media access control (MAC)

media access control (MAC)

A ________ is a group of two or more computers, or nodes, configured to share information and resources. A) router B) bus C) bridge D) network

network

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A) viewing B) examination C) scanning D) screening

screening

A print server uses a print ________ as a software holding area for jobs waiting to be printed. A) stack B) spooler C) logger D) heap

spooler

Which of the following is the most commonly used client/server network topology? A) Star B) Cluster C) Ring D) Hierarchical

star

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. A) endcap B) terminator C) stopper D) block

terminator

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. A) brute force attack B) spammer C) worm D) Trojan horse

brute force attack

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. A) star B) bus C) hierarchical D) cluster

bus

A ________ network can contain servers as well as individual computers. A) client/server B) peer-to-peer C) switch D) star

client/server

Which of the following is NOT a common network topology? A) Star B) Cluster C) Linear bus D) Ring

cluster

________ is the standard communications protocol used on most client/server networks. A) Ethernet B) NOS C) Mac D) VPN

ethernet

________ cable is NOT subject to electromagnetic interference or radio frequency interference. A) Twisted-pair B) Fiber-optic C) Polycarbonate D) Coaxial

fiber-optic

A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database

file

A ________ keeps your computer safe by determining who is trying to access it. A) gateway B) firewall C) hub D) switch

firewall

A ________ topology uses more than one topology when building a network. A) hybrid B) multiple-use C) fusion D) crossover

hybrid

In a ________ network, each node connected to the network communicates directly with every other node. A) client/server B) peer-to-peer C) router D) bridge

peer-to-peer

A network ________ is a set of rules for how information and communications are exchanged. A) protocol B) token C) frame D) packet

protocol

A ________ sends information between two networks. A) repeater B) switch C) bridge D) router

router

Ring networks use the ________ method to avoid data collisions. A) packet screening B) active-check C) token D) passive-check

token

Most wired home networks use ________ cable, which is most susceptible to interference. A) fiber-optic B) unshielded twisted-pair C) Wi-Fi D) coaxial

unshielded twisted-pair


Conjuntos de estudio relacionados

Uworld Adult Gastrointestinal and Cardiovascular

View Set

L'engagement: Les Mains Sales- Sartre, Quotations, Pre-U French, Paper 4: Topics and Texts

View Set

PSYCH 25 Ch 5: Physical Development

View Set

GRE Math Things that I Forget too Easily

View Set

Gulliver's Travels by Jonathon Swift

View Set