TIA Chapter 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which type of network topology is most popular? 1. ring 2. star 3. Ethernet 4. bus

2. star

Which of the following is NOT a common network topology? 1. Cluster 2. Linear bus 3. Ring 4. Star

1. Cluster

A network consisting of two LANs separated by great physical distances is known as a: 1. WAN 2. LAN 3. HAN 4. SAN

1. WAN

Which of the following is used to increase security on a client/server network? 1. bastion host 2. database server 3. bridge 4. transmission media

1. bastion host

A ________ sends data from one collision domain to another. 1. bridge 2. link 3. switch 4.router

1. bridge

A(n) ________ server is a server that stores and manages files for network users. 1. file 2. print 3. e-mail 4. database

1. file

A ________ is a group of two or more computers, or nodes, designed to share information and resources. 1. network 2. router 3. bus 4. bridge

1. network

Ring networks use the ________ method to avoid data collisions. 1. token 2. active-check 3. passive-check 4. packet screening

1. token

Network adapters send data packets based on a(n) 1. IP address. 2. MAC address. 3. frame address. 4. router address.

2. MAC address

Why are client/server networks usually installed in businesses? 1. They do not require dedicated servers like P2P networks. 2. They are more scalable than P2P networks. 3. Security is weaker on client/server networks. 4. Client/server networks are cheaper to install.

2. They are more scalable than P2P networks.

Cars often have ________ networks. 1. ROVER-5 and ethernet 2. Wi-Fi and Bluetooth 3. Exhaust and fuel injection 4. IPv7 and IPv6

2. Wi-Fi and Bluetooth

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. 1. dedicated 2. authentication 3. application 4. file

2. authentication

Correctly entering the user ID and password on your college network is an example of: 1. scalability. 2. authentication. 3. packet screening. 4. virtualization.

2. authentication

To ensure only authorized users are logging onto a network, which server would a client/server network include? 1. communications 2. authentication 3. application 4. Internet

2. authentication

Which of the following is not an advantage of installing a network in a business? 1. enables software sharing 2. decentralization of files and data 3. enables peripheral sharing 4. centralization of files and data

2. decentralization of files and data

NOS software is needed: 1. only on the servers in a client/server network. 2. on all computers in a client/server network. 3. only when configuring a network in a star topology. 4. only if a communications server is deployed on a client/server network.

2. on all computers in a client/server network.

Providing adequate security on a corporate network involves all of the following issues except: 1. authentication. 2. proprietary software lockout. 3. limiting physical access to networking equipment. 4. restricting access to servers.

2. proprietary software lockout.

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals. 1. block 2. terminator 3. endcap 4. stopper

2. terminator

On client/server networks, routers: 1. move data efficiently from node to node on the internal network. 2. transfer data between two networks. 3. route data between two collision domains on a single network. 4. are necessary only in networks using the ring topology.

2. transfer data between two networks.

For business networks, which of the following is NOT a main cable type? 1. Coaxial 2. Fiber-optic 3. Duplex 4. Twisted-pair

3. Duplex

The computers in a lab on a floor of a building would be connected using a ________. 1. WAN 2. MAN 3. LAN 4. PAN

3. LAN

A ________ uses the Internet communications infrastructure to build a secure and private network. 1. WAN 2. HAN 3. VPN 4. PAN

3. VPN

Which of the following is NOT a factor to consider when selecting network cabling? 1. Maximum run length 2. Bandwidth 3. Cable diameter 4. Interference

3. cable diameter

To manage authorized connections to external networks, which server would a client/server network include? 1. authentication 2. application 3. communications 4. database

3. communications

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. 1. hit 2. crash 3. jam 4. stop

3. jam

In a ________ network, each node connected to the network communicates directly with every other node. 1. router 2. client/server 3. peer-to-peer 4. bridge

3. peer-to-peer

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. 1. sniffing 2. scanning 3. screening 4. viewing

3. screening

________ is the standard communications protocol used on most client/server networks. 1. TCP/IP 2. VPN 3. NOS 4. Ethernet

4. Ethernet

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? 1. Vendor network 2. HAN 3. MAN 4. Intranet

4. Intranet

Why are P2P networks not usually installed in businesses? 1. They require dedicated servers. 2. Client/server networks are cheaper to install. 3. They are more scalable than client/server networks. 4. Security is stronger on client/server networks.

4. Security is stronger on client/server networks.

Which of the following is an advantage of installing a client/server network in a business? 1. centralization of network adapters 2. decentralization of peripherals 3. decentralization of files and data 4. centralization of network security protection

4. centralization of network security protection

Fiber-optic cable most likely would be used in a business network when 1. the installation budget is very limited. 2. very short cable runs are required. 3. saving money is more important than speed. 4. electrical or magnetic interference is present.

4. electrical or magnetic interference is present.

A ________ topology uses more than one topology when building a network. 1. crossover 2. multiple-use 3. fusion 4. hybrid

4. hybrid

The physical address assigned each network adapter is called its ________. 1. network physical address (NPA) 2. network access control (NAC) 3. physical address control (PAC) 4. media access control (MAC)

4. media access control (MAC)

A print server uses a print ________ as a software holding area for jobs waiting to be printed. 1. stack 2. logger 3. heap 4. spooler

4. spooler

Which of the following is the most commonly used client/server network topology? 1. Cluster 2. Ring 3. Hierarchical 4. Star

4. star

Bridges are used to route data between two different networks. T/F

False

Client/server networks are generally less secure than P2P networks T/F

False

A web server is used to host websites on a client/server network T/F

True

Most modern operating systems include some type of NOS functionality. T/F

True


Conjuntos de estudio relacionados

Ch. 9 Flexible Budgets and Performance Analysis

View Set

Practice Exam Questions Macro Economics

View Set

World History | Module 13 | Lesson 9: Quiz: "How Many Years of War?"

View Set

OTMT Ch 11 - Base Pay Structures

View Set

ACCT 240, CHP 9: FLEXIBLE BUDGETS AND PERFORMANCE ANALYSIS

View Set

Exam II American Government Study Guide

View Set

Anatomy and Physiology Ch 25 Metabolism

View Set