Chapter 12: DIY Quiz
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.
Bandwidth
A ________ sends data from one collision domain to another.
Bridge
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
Bus
Which of the following is NOT a major factor to consider when selecting network cabling?
Cable diameter
Which of the following is NOT a common network topology?
Cluster
________ is the standard communications protocol used on most client/server networks.
Ethernet
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
Fiber-optic
A(n) ________ server is a server that stores and manages files for network users.
File
A ________ keeps your computer safe by determining who is trying to access it.
Firewall
A ________ topology uses more than one type of topology when building a network.
Hybrid
A(n) ________ address is the address that external entities use when communicating with your network.
IP
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
Jam
The computers in a lab on a floor of a building would be connected using a ________.
LAN
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
Network
In a ________ network, each node connected to the network communicates directly with every other node.
Peer-to-peer
For business networks, which of the following is NOT one of the main cable types?
Polyvinyl
A network ________ is a set of rules for how information and communications are exchanged.
Protocol
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
Screening
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
Spooler
Which of the following is the most commonly used client/server network topology?
Star
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
Terminator
Ring networks use the ________ method to avoid data collisions.
Token
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
Cars often have ________ connectivity.
Wi-Fi and Bluetooth
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
bastion host
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
brute force attack
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
Authentication
The physical address assigned to each network adapter is called its ________ address.
media access control (MAC)
A ________ network can contain servers as well as individual computers.
client/server
A ________ sends information between two networks.
router
Most wired home networks use ________ cable, which is most susceptible to interference.
unshielded twisted-pair