Tech in Action Chapter 12
method used on Ethernet networks to avoid data collisions
CSMA/CD
Peer-to-peer networks are considered centralized networks.
False
Routers are used to send data on a specific route through an internal network.
False switches
A network consisting of nodes covering a small geographic area is a
LAN
The computers in a lab on a floor of a building would be connected using a ________.
LAN
)Which topology tends to provide the fairest allocation of network resources?
Ring
Which of the following is an advantage of installing a client/server network in a business?
Sharing of peripherals
P2P networks become difficult to administer when they have large numbers of users.
True
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
True
Which network cable type is most susceptible to signal interference?
UTP
A(n) ________ server is a repository for shared computer programs accessed by client computers.
application
The process whereby users prove they have authorization to use a computer network is known as
authentication.
Which is not a key component of a typical client/server network?
bastion host or transmission method
In which topology are all computers connected in sequence on a single cable?
bus
A ________ network can contain servers as well as individual computers.
client/server
Which of the following is not a common network topology?
cluster
Fiber-optic cable most likely would be used in a business network when
electrical or magnetic interference is present.
A bridge sends information between two networks.
false
A proxy server is used to host websites on a client/server network.
false
An authentication server is used to host websites on a client/server network.
false
Data flows in both directions around the ring in a ring network.
false
MAC adapters perform specific tasks to enable nodes to communicate on a network.
false
Multi-factor authentication requires three of four possible factors be demonstrated before authorizationis granted.
false
UTP cable has foil shielding.
false
In a client/server network, each network node communicates directly with every other node on the network.
false (P2P does)
________ cable is not subject to electromagnetic interference or radio frequency interference.
fiber optic
A(n) ________ server is a server that stores and manages files for network users.
file
Sometimes groups of data packets are sent together in a package called a
frame.
A ________ topology uses more than one type of topology when building a network.
hybrid
Which of the following is not one of the factors used in multi-factor authentication?
identity
Providing adequate security on a corporate network involves all of the following issues EXCEPT
proprietary software encryption
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
scalability.
Which of the following is the most commonly used client/server network topology?
star
Which of the following is not used to increase security on a client/server network?
switch
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
Ring networks use the ________ method to avoid data collisions.
token
On client/server networks, routers
transfer data between two networks.
Most modern operating systems include some type of NOS functionality.
true
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
true
Star topologies are the most widely used topology.
true
Switches are used to send data on a specific route through an internal network.
true
The foil sheath on a STP cable is there to help cut down on interference.
true
When several people need access to a database, a dedicated database server can be the solution.
true
An international company like Microsoft would use a MAN to connect all of its computers.
False
In a star topology, the nodes connect to a central communications device called a router.
False
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
Intranet
Network adapters send data packets based on a(n)
MAC address
used for internal identification of nodes on a network
MAC address
network in which each node connected to the network communicates directly with every other node
P2P
A communications server manages Internet connectivity.
True
A facial-recognition scanner is an example of a biometric authentication device.
True
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
Network adapters use _______ addresses to route date on an internal network.
MAC
an operating system for network servers
NOS - network operating system
One function of a communication server is to process and deliver incoming and outgoing e-mail.
false (email server does)
Which network cable type is virtually immune to signal interference?
fiber-optic
In an active topology, each node helps to move data through a network.
true
Network adapters perform specific tasks to enable nodes to communicate on a network.
true
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
brute-force attack
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
bus
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
jam
The physical address assigned to each network adapter is called its ________ address.
media access control: MAC address
NOS software is needed
on all computers in a client/server network.
A ________ is a set of rules for exchanging communications.
protocol
A network ________ is a set of rules for how information and communications are exchanged.
protocol
An application server acts as a repository for application software.
true
Most wired home networks use ________ cable, which is most susceptible to interference.
unshielded twisted-pair
adapter card that connects a computer to a network
NIC
Which server would a client/server network include to ensure only authorized users are logging onto the network?
Authentication
Which of the following is not an advantage of installing a network in a business?
Decentralization of files and data
Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?
virtualization
Advantages of a network
Centralization of files and data Enables peripheral sharing Enables software sharing
Why are client/server networks usually installed in the home?
Client/server networks are too complex for most home networks.