Unit 4 Computer Networks
fiber optic cable
A connection that uses light to transmit information.
_________________ is computed from other data contained within an IP packet and stored as part of the IP packet.
A checksum When the IP packet arrives at its destination, the checksum is re-computed and the two are compared.
Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data it is malware
When one user is accessing some data and others are shut out of accessing that data, this is a problem for?
Availability Availability requires that information is available when needed.
Which of the following statements is not part of the path a message takes from one computer to another?
All messages require a response from the destination machine to the sending device. Not all messages require a response from the destination machine to the sending device.
SQL Injection
An attack that targets SQL servers by injecting commands to be manipulated by the database. In a SQL injection, an attacker issues an SQL command to a web server. The web server might pass the SQL command onto the database, and the command could delete and change records.
anti-viral software
Attempts to identify if a file contains a virus or some form of malware
What is required to verify authenticity of the recipient? Select three that apply.
Certificates Encryption Digital signatures All three of these will verify authenticity of the recipient. Encryption will indirectly verify authenticity of a private key exchange if the private key has not been compromised. Certificates can be used to verify digital signatures among other functions.
Which of the following type of transmission is paired correctly with the given media?
Coaxial cable - Light impulses Fiber optic cable - Electricity Fiber optic cable - Light impulses Coaxial cable - Radio waves Correct answer is C. Fiber optics uses light pulses for transmitting information.
database server
Computer on a network that stores data for other users to access.
Which of the following is NOT a characteristic of a bus network topology?
Expensive compared to other topologies. Is a very reliable form of network. All messages travel along a single cable. Is one of the more simple types of network topographies. Correct answer is A. This answer does not describe a bus network.
IT personnel need to avoid redundancy when setting up security.
False Information security will ensure CIA of information when it is stored, and redundancy will ensure proper storage.
Your site's Internet point of presence is called a:
Gateway A gateway is your site's Internet point of presence.
In strategic risk analysis, what is the first step?
Identify information assets Identifying information assets are the first step.
Bus Topology
Network configuration wherein all computers connect to the network via a central bus cable. A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to.
What is the primary tool used to connect to a network?
Printer Wireless modem Computer Hand-held device Correct answer is C. While other devices are often connected in a network, the computer is the primary tool of the network.
What will ensure proper storage so that data are available even when storage devices are damaged or offline?
Redundancy will ensure proper storage.
Circuit Switched Network
Requires that a full pathway, or circuit, be est. before transmission can begin and maintained during the entire transmission you can send and receive at the same time.
What information is not public and will not be considered a threat to a person's privacy if others learned of it?
Sensitive Sensitive information will not be considered a threat to a person's privacy.
Which of the following best describes the Internet?
The Internet is a global network of networks. The Internet is a global network comprised of many different networks.
Which of the following servers responds to HTTP requests on the Internet?
Web server FTP server File server Print server Correct answer is A. A web server responds to requests from anywhere on the Internet, not just from a LAN.
A DNS will not store an IP address for a particular alias in its local DNS server table after receiving it from a higher-level DNS.
Yes No Correct answer is No. A DNS does store an IP address for a particular alias in its local DNS server table after receiving it from a higher-level DNS so that it is available for later use.
packet switching
When communication is broken into smaller pieces of data and sent separately across a network, often across different pathways.
Which of the following will find vulnerabilities and fix or protect against them?
White-hat hacking White hats use techniques of black hats in order to detect and test against vulnerabilities
denial of service attack
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources
The requirement that data be kept secure so that they cannot be obtained by unauthorized users is an example of
confidentiality. Confidentiality puts measures in place to ensure sensitive data should not be accessible to unauthorized individuals.
A certificate authority
contains both the authentication proof and the encryption information needed to send secure information A certificate authority will send secure information without concern of information being intercepted and accessed.
Learning about social engineering and how to protect passwords is an example of ___.
education Users must be educated on how to protect passwords.
Defense in Depth
employing multiple layers of controls to avoid a single point-of-failure
A _____________ does the following: Runs server side scripts, logs requests and errors, handles security.
file server database server web server Correct answer is C. A web server will run server scripts, log requests and errors and handle security.
What prevents certain traffic from coming into and out of the network?
firewalls Firewalls prevent certain traffic from coming into or out of the network.
Packet Sniffing
inspecting information packets as they travel the Internet and other networks Packet sniffing will obtain passwords if the data being transmitted is sent without encryption.
Malware
malicious software
Symmetric key encryptio
re
First City Bank is preparing to roll out a new online banking system for its customers. Installing the new hardware and software has taken longer than expected, but the manager is confident customers will be thrilled with the new service. On the day of the launch, a seemingly minor programming error causes the system to shutdown and reboot each time the clock reaches a new hour. It takes about ten minutes for it to be up and running again. Which security goal is at risk?
Availability Availability is at risk because the system will shut down each time the clock reaches a new hour.
Ensuring that data is accessible and information is available when needed is an example of
Availability Availability is ensuring that data is accessible and information is available when needed.
IP address aliases must be translated to IP addresses like the ones in the last column in order for routers and devices to be identified. What is needed in order to make this translation?
Domain name server The domain name server contains information that allows the translation from the alias to the IP address.
Symmetric Key Encryption
Encryption system in which a single key is used for both encryption and decryption.
network switch
More functional than a hub; records and recognizes the local network addresses (MAC or IP) or all computers connected to it
http://www.cnn.com/travel/ In the URL above, the bolded portion is an example of:
Protocol Domain Name Resource ID Correct answer is A. Although today's modern browsers usually leave out this portion when typing a URL, the protocol is followed by a colon and two forward slashes.
http://www.cnn.com/travel/ In the URL above, the bolded portion is an example of:
Protocol Domain Name Resource ID Correct answer is B. Domain names frequently end with extensions such as .com for company or commercial sites.
What type of information can present a threat if disclosed such as social security numbers?
Private Social security numbers are private information and could be a threat to privacy.
A _____________ does the following: Does not return files, monitors requests, replies when a request is complete.
database server FTP server print server Correct answer is C. A print server monitors and manages print requests.
A _____________ does the following: Responds to client (computer) requests over the LAN, supports application software, shares data files.
file server web server Correct answer is A. A file server generally responds to requests for files within a LAN.
All of the following are authentication except
phishing. Phishing is a suspicious e-mail asking for personal information.
Strategic Risk Analysis
1. Identify the organization's information assets 2. Identify vulnerabilities of each asset 3. Determine threats 4. Prioritizing risks 5. Develop and enact policies that will reduce threats
State the steps in an email being sent.
1. Maria's e-birthday card to her grandmother would first be divided into multiple small packets by her computer. 2. Each packet of Maria's message is given the destination address. Once the IP address has been provided, the packets are sent out. 3. If Network Address Translation (NAT) is being used at the remote site, the IP address is translated from an "external public" address to an "internal private" address. The internal private message then continues to be routed internally to the destination network. 4. All packets of Maria's e-birthday card would be combined together as they arrived. Once all the packets have been received, the final message is then presented to the appropriate application software.
Web Server
A computer that runs special software to serve up Web content by responding to requests.
Buffer Overflow
A technique for crashing by sending too much data to the buffer in a computer's memory
Spyware
A type of Malware that locates and saves data from users without them knowing about it.
Mary works for a large school district. Her responsibility is to monitor the site containing student attendance records. Mary has created an elaborate security system with unique identification numbers for each student. She has built in a number of security controls and is continually monitoring for unauthorized users. Each day, Mary takes two 10-minute breaks at exactly 10 a.m. and 3 p.m. Since she is gone such a short time she leaves whatever project she is working on up on on her computer screen for anyone to see. Which security goal is at risk?
Confidentiality Confidentiality is at risk because Mary is leaving the project up on her computer screen.
What part of information assurance and security (IAS) requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized individuals?
Confidentiality Confidentiality requires that information be kept secret
In order to translate from an IP alias to an IP address, which of the following is used?
DNS A Domain Name Server (DNS) is used to translate from an IP alias to an IP address.
In the strategic risk analysis, prioritizing risks is before which final step?
Develop and enact policies against threats Prioritizing risks comes before developing policies.
Which is part of the definition of Domain Name?
Identifies the server on which a web page can be found. Domain names identify the server on which a web page can be found.
data integrity
In a database or a collection of databases, the condition that exists when data values are consistent and in agreement with one another.
Randy runs a small consulting firm and keeps all of his business contacts in a computer database. When Randy turns on his computer on Monday morning, he gets a weird error message. He calls in his IT specialist who determines their system has been infected with a virus. After hours of work, they think they have the customer database cleaned up, but occasionally, over the next few weeks, small errors still are being found. Which security goal is at risk?
Integrity Integrity is at risk because the virus could easily lead to corrupt data.
What part of information assurance and security (IAS) requires that data is correct, data gathering ensures the accuracy of the data, data must be entered into the system accurately, and data modification must be tracked.
Integrity Integrity requires that data be correct
Entering data into the system accurately is an example of
Integrity Integrity will ensure accuracy of the data, and enter the data into the system accurately. Integrity in terms of the CIA triad is ensuring that data has not been tampered with. An example would be running a hash against an original file to verify that it is identical.
Which of the following describes a local computer?
It is a computer that a person is physically at. Servers are often this type of computer. It is often part of a computer network. It is a computer that is accessed over the network. Correct answer is A. Where a person and computer are located together makes a computer local.
All of the following are parts of a URL except for:
LAN LAN is a local area network and not part of a URL.
What is a method of obtaining a password when the data is sent over a network and the data is sent without encryption?
Packet sniffing Packet sniffing is a means of obtaining a password if the data is sent without encryption.
Packet Switching ------ that is used to send messages over the internet.
Packet switching is a digital communications method that breaks down communication into small packets of data.
Security classifications can be public, sensitive, private, or confidential. Information that can be found online or in the phone book is
Public Information that can be found online or in the phone book is public.
Which device permits packet switching so that a message can be routed to the next link in a network?
Router A router is a device that permits packet switching in order to send messages to the next link in the network.
Which of the following types of information present a threat to someone's privacy?
Student ID and credit card numbers Student IDs and credit card numbers are private information.
Which of the following devices is used to connect one network to another network?
Switch Hub Router Correct answer is C. Routers are the main means of connection between one network and another.
How does a wide area network (WAN) enhance the business ecosystem? Select two that apply.
Team members can review files on the shared drive synchronously. Employees in different locations can share software. Both of these enhance the business ecosystem.
Integrity
The assurance that data and information is 1. collected accurately, 2. stored accurately and 3. that any changes are recorded accurately person, time of change in case there need to be corrections to the change.
Availabiltiy
The part of information assurance and security that makes sure data is available when needed. Things like power outages, device malfunctions, and DoS attacks can affect availability.
Anti-viral software should be updated frequently.
True New releases of anti-viral software may come out daily or weekly.
The firewall software contains a list of rules that describe the types of incoming messages that should either be permitted or blocked from a computer.
True The firewall software contains a list of rules that types of messages should either be permitted or blocked to make it through the firewall.
The abbreviation "URL" indicates:
Uniform Resource Locator The abbreviation "URL" indicates the Uniform Resource Locator.
Which of the following is not malware?
Unix Unix is an operating system.
Sends requests to other DNS servers when it cannot locate an IP alias.
Yes No Correct answer is yes. A DNS server sends a request to DNS servers that are higher in the hierarchy until a particular DNS is able to translate the alias to the IP address.
It translates Internet aliases to IP addresses.
Yes No Correct answer is yes. When provided with an Internet alias, the DNS looks the entry up in its own DNS table and returns the corresponding IP address.
The ordering of packets is done by
a DNS server table. IP. a higher-level TCP protocol. Correct answer is C. A higher-level TCP protocol orders the packets once all packets have been received.
firewalls
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network it is malware
A local area network (LAN)
allows hardware sharing within one office. A LAN allows hardware and software sharing within one office.
Which statement best completes the sentence: Black-hat hackers ______________
hack with malicious intent to commit crime or terrorism. Black-hat hackers hack with malicious intent.
Complete the sentence: Public key encryption uses __________.
one public key & one private key
Symmetric key encryption
requires that both parties in the communication have the same key.
CIA
the 3 things of IAS (Information Assurance and Security) Confidentiality Integrity Availability
Confidentiality
the assurance that messages and information are available only to those who are authorized to view them
The process of encryption involves
transforming text into a scrambled, undecipherable message. Encryption will convert plain text to scrambled encrypted information.
Public Key Encryption
uses two keys: a public key that everyone can have and a private key for only the recipient
Access rights
will include files that the user can access. Access rights will include files that the user can access and will not include files that the user should not access.
domain name
text version of an IP address The domain name typically identifies the organization that is responsible for the information. identifies the web server on which the web page can be found The domain name consists of the host name and the top-level domain (TLD) name. i.e cnn.com or google.com
Routing Decision
the destination network pathway that a message takes and it is based on a routing table stored in the routers memory.
Broadcast technology
A communication system based on or dependent on broadcasts rather than unicast signaling.
Which of the following is the best definition of a computer network?
A computer network consists of two or more computers linked together that share devices such as printers and file servers but they are not able to share software. A computer network consists of one computer connected wirelessly to a printer. A computer network consists of a number of computers connected via a device that allows them to connect to the Internet. A computer network is a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources. Correct answer is D. Computer networks include the physical computers as well as other hardware devices such as printers and software and networks allow all devices to communicate.
Server
A computer that awaits and responds to requests for data such as files or access to a printer. servers are more expensive computers because they require more hard disk storage and a faster response time. most servers are made of smaller servers stacked up together.
client
A computer that requests data stored on a server.
Packet Switched Network
A message's pathway is only est. as it is sent; the choice of pathway is based on availability and amount of message traffic, most computer networks are packet switched.
Routers--------until they reach a LAN.
A router moves the message along the network until it reaches its destination.
IP Addresses
A series of numbers that indicates a specific internet location
What are the three definitions of a server?
A server is: 1. a dedicated computer used to provide a service. i.e a high performance computer with high disk storage 2. the software that is run on a machine. i.e. print service, file server, ftp server, web server, e-mail server and database server. 3. the collection of hardware, software and data that make up the whole server. i.e web server is the hardware, software and web data.
e-mail server
A server that processes and delivers incoming and outgoing e-mail.
protocol
A set of rules governing the exchange or transmission of data between devices. Web pages use HyperText Transfer Protocol. i.e. http or https
Which of the following best describes the benefits of a star network topology?
A star network requires a dedicated device (server, hub, or switch) which makes communication more efficient. It is easy to add (or remove) devices on a star network and maintain the efficiency of message transferal. All devices in a star network have a single point-to-point connection with the neighboring computers in the network. In a star network, every device has a point-to-point connection with every other device in the network. This allows any device to communicate with any other device. Correct answer is B. This is a benefit of the star network topology.
Which of the following statements describes the difference between a switch and a network hub?
A switch is a device that connects various networks together, while a network hub is only able to connect computers and devices in a network. A switch is a device that connects computers in a network and has the ability to transfer incoming messages to a specific intended computer based on the MAC address on the message. A network hub is a device that connects computers in a network, but doesn't have the ability to transfer messages to specific computers. A network hub is a device that connects computers in a network and has the ability to transfer incoming messages to a specific intended computer based on the IP address on the message. A switch is a device that connects computers in a network, but doesn't have the ability to transfer messages to specific computers within the network. A network hub is a device that connects various networks together, while a switch is only able to connect computers and devices in a network. Correct answer is B. This choice correctly describes the functionality of a switch and hub.
peer-to-peer network
A type of network that connects two client computers directly together.
Which of the following is the best definition of a virtual machine?
A virtual machine (VM) is a software emulator program that only allows a limited number of computer users to use multiple computers and multiple platforms at the same time. A virtual machine (VM) is a software emulator that increases a computer's ability to run software but only when using the same operating system. A virtual machine (VM) is a software emulator that allows users to experiment with different operating systems; however, additional computers must be purchased to run the different OSs. A virtual machine is an illusionary computer that is stored in computer memory and made available by software in order to permit a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. Correct answer is D. This is the definition of a virtual machine.
Which of the following statements is true of computer networks?
Computer networks allow individuals to share hardware such as printers, but not software. Computer networks are not useful unless they are connected to the internet. Computer networks allow individuals to share many types of resources. Computer Networks are inherently secure. Correct answer is C. Networks allow the transmission of documents, video, audio and other types of files as well as shared resources.
How do virtual machines support a business computing ecosystem?
A virtual machine (VM) is a whole separate physical computer that provides users access to an OS different from their primary computer. Being able to have access to a computer with a different OS facilitates collaboration in the business ecosystem. A virtual machine (VM) is a server that users can log into and use different OSs and applications associated with the different OSs. A virtual machine (VM) is a broadcasting device that facilitates communication across a network, thus supporting a business computing ecosystem. A virtual machine (VM) is made available by software and permits a computer to run multiple OSs. In a business ecosystem, this allows for improved collaboration that is not restricted by platform software. Correct answer is D. A virtual machine allows a computer of one operating system to run other operating systems and applications specific to that alternative OS.
Which of the following are characteristics of a packet-switched network?
A. The path exists during the entire transmission, allowing communication in either direction to occur simultaneously. B. The choice of pathway is based on network availability and amount of message traffic. C. The route is established one branch at a time. D. A and B E. B and C Correct. Both B and C are characteristics of a packet-switched network.
Star Topology
All nodes are connected to a central computer. A LAN configuration in which a central node controls all message traffic
Why would it be desirable to use a switch as opposed to a hub in a network?
Because a switch is a more powerful device, it can be used over longer distances compared to a hub. Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is less than that of a hub. Because switches only transfer information to specific computers within a network and not all of the computers, the bandwidth used with a switch is more than that of a hub. Correct answer is B. This choice correctly reflects the difference between a switch and a hub.
How do a router and switch differ when handling a message?
Both a router and a switch use the message's destination address to select the line to route the incoming message to. The switch will purposefully drop messages if message traffic exceeds its capacity. The router will purposefully drop messages if message traffic exceeds its capacity. There is no difference in how a router and a switch handle messages. Correct answer is C. A router has additional decision-making capabilities compared to a switch.
Which of the following is/are an example(s) of computer networks?
Computer networks are a collection of hand-held devices connected via the Internet so that they can communicate with each other. Computer networks are a collection of computers and resources connected by various media so that they can communicate with each other. Computer networks are a collection of desktop computers and printers connected by cables to a central server so that they can communicate with each other. All of the above Correct answer is D. All descriptions are examples of computer networks.
network hub
Connects multiple computers together; broadcasts the transmission, sending the data to every device in the network
What is the possible role of the database server?
Contains employee emails Contains payment data Contains the web pages for customers to access Correct answer is B. The database server will contain customer payment information from credit and debit cards.
What is the possible role of the web server?
Contains employee emails. Contains payment data Contains the web pages for customers to access. Correct answer is C. A web server would provide web pages to customers.
IP addresses ------- have English-like name aliases to facilitate communication over the internet.
Correct. Because IP addresses consist of numbers, they have English-like name aliases to make it easier for individuals to remember an address - such as CNN.com versus http://157.166.226.26.
Which of the following servers can generate reports from client queries?
Database server File server Web server Mail server Correct answer is A. The database server generates reports based on client queries.
Mesh Topology
Devices are connected with many redundant interconnections between network nodes. every computer connects to every other computer; no central connecting device is needed
What type of transmission is being sent along the fiber optic cable?
Electric current Radio waves Light impulses Correct answer is C. Fiber optic cables use light to transmit data.
What is the most common type of local, physical network connection in use today?
Fiber optic cable and radio towers Radio towers and satellite Fiber optic and UTP Coaxial and radio towers Correct answer is C. The most common form of local, physical network connection used today is UTP (Unshielded Twisted Pair) and fiber optic cable. However, UTP is becoming a less common technology utilized for connections with fiber to the home, coax from cable providers, and wifi/cellular communications from mobile devices.
Which of the following servers monitors requests, but doesn't send files in return?
File server Web server FTP server Print server Correct answer is D. A print server only sends acknowledgement that a print job is complete or sends an error message. A print server does not send files.
Which of the following best describes the purpose of hubs, switches and routers within a network?
Hubs, switches, and routers are devices that recognize the IP address of all devices on the network and relay messages only to the appropriate IP address. Hubs, switches, and routers are devices that forward messages to all ports on the network. Hubs, switches, and routers are devices that route messages to other networks. Hubs, switches, and routers are devices that provide points within a network where messages can be relayed to the computers and devices within the network. Correct answer is D. These devices enable communication between devices and computers on a network.
What is the role of a client-server network in a business computing ecosystem?
In a client-server network, each computer is equal to every other computer on the network. This facilitates the broadcasting of messages and thus, communication between elements in the business ecosystem. In a client-server network, software enables access to remote servers. This allows different parts of a business ecosystem to interact. In a client-server network, the server (or device) requests information from the client. These requests allow communication to flow across the business ecosystem. None of the above. Correct answer is B. The software used in a client-server network facilitates communication with remote servers, which supports a business computing ecosystem.
What is the typical bandwidth of today's networks?
Kbps Bps Mbps to Gbps None of the above Correct answer is C. Mbps stands for megabits or millions of bits per second and Gbps stands for gigabits or billions of bits per second.
The above LAN is set up using what type of network logic?
Line Mesh Star Bus Correct answer is D. The setup above is representative of bus logic.
Indicate whether each of the following relates to a local computer, a remote computer, or both. An employee is using telnet to log into a colleague's computer to troubleshoot an issue.
Local Remote Both Correct answer is both. Telnet is used to access one computer from another; therefore requires a local and remote computer.
Indicate whether each of the following relates to a local computer, a remote computer, or both. An employee logs in from home to the company's server to update their time sheet.
Local Remote Both Correct answer is both. The employee's home computer is local and the server is remote.
Indicate whether each of the following relates to a local computer, a remote computer, or both. The sales associate is using their desktop computer to develop a report using Excel.
Local Remote Both Correct answer is local. A desktop computer accessed by an employee in the same location is a local computer.
Indicate whether each of the following relates to a local computer, a remote computer, or both. The IT department is updating the ssh (secure shell) on the company's server to provide improved access when employees are off-site.
Local Remote Both Correct answer is local. Though using ssh for improved off-site access the IT department is working on servers locally.
Which of the following is a characteristic of a ring network topology?
Messages can be sent in only one direction, it is very expensive, and it is difficult to add new devices. New devices can be easily added, however message transmission time may be longer based on the number of devices on the network. Requires a point-to-point connection between each device on the network, messages can be sent unidirectionally or bidirectionally, are similar in cost to the mesh network. Correct answer is B. This is a characteristic of ring networks.
Indicate whether the following are true of a network hub, a router, a switch or all. This device normally broadcasts messages to all ports.
Network hub Router Switch All Correct answer is A, hub. This device doesn't have the capability of storing MAC or IP addresses, therefore it can't distinguish one computer from another and sends messages to all computers in the network.
Indicate whether the following are true of a network hub, a router, a switch or all. This provides a means for devices and networks to communicate with each other and connect to devices in other networks.
Network hub Router Switch All Correct answer is All. All of these devices help to facilitate network communication.
Indicate whether the following are true of a network hub, a router, a switch or all. This device connects multiple networks together.
Network hub Router Switch All Correct answer is Router. Routers are most commonly used to connect networks not individual computers.
Indicate whether the following are true of a network hub, a router, a switch or all. This is commonly used to connect multiple computers together in such a way that messages are relayed to computers with the corresponding MAC address.
Network hub Router Switch All Correct answer is Switch. This device can store MAC addresses of computers and send messages only to intended computers.
Client/Server
Network system that uses servers to store data centrally and client computers to access them.
http://www.cnn.com/travel/ In the URL above, the bolded portion is an example of:
Protocol Domain Name Resource ID Correct answer is C. The resource ID indicates a file name. The file name may also end with a three- or four-letter designation such as .html.
Indicate whether each of the following is a function of routing, switching, or both. Moving a message onto the appropriate network
Routing Switching Both Correct answer is A. A router is used to connect one network to another.
Indicate whether each of the following is a function of routing, switching, or both. Used to move traffic from one network to another network
Routing Switching Both Correct answer is Router. A router is used to connect one network to another.
Indicate whether each of the following is a function of routing, switching, or both. Influences the path a message will take: direct or indirect
Routing Switching Both Correct answer is both. Both routers and switches determine the path a message will take.
What is the role of the router in this network?
Sends radio waves over long distances Sends transmissions to a specific, intended computer Sends transmissions to all devices in a network Connects multiple networks together Correct answer is D. A router connects multiple networks together.
What is the role of the switch in the network?
Sends radio waves over long distances Sends transmissions to all devices in a network Sends transmissions to a specific, intended computer Connects multiple networks together Correct answer is C. A switch purpose is to only send transmissions to a specific, intended computer.
Resource ID
Short unique numeric or text identification assigned to each specific resource to differentiate that resource from other resources. indicates the file you want to access or the location of the file on the web server The resource ID is file name may end with a three- or four-letter designation that signifies the file type.
virtual machine (VM)
Software that simulates the hardware of a physical computer, creating one or more logical machines within one physical machine.
Which of the following communication system hardware devices is commonly used as a wireless access point?
Switch Radio waves Hub Router Correct answer is D. Routers can be used as a wireless access point, although not all routers are wirelessly enabled.
What is meant by a particular media bandwidth?
The amount of data that can be transmitted over a unit of time, such as bits per second How long it takes for a device to connect to a server, webpage, or remote computer The amount of time required to connect to the internet in bps Correct answer is A. Bandwidth is the transfer rate in bits per second and is influenced by the type of media.
Bus network topology
The bus network topology is also known as a linear bus because the computers in such a network are linked using a single cable called a trunk or backbone. If a terminator on a bus network is loose, data communications might be disrupted. Any other break in the cable cause the entire network segment to fail. the next simplest topology
Which of the following is a characteristic of a packet-switched network?
The full pathway for the message to reach its destination is established before the message is sent. Communication taking place between the same two computers may reach their destination using different pathways. Is the type of network used in most telephone lines. Correct answer is B. Packet-switched networks choose the message pathway based on network availability and amount of message traffic.
Routers
The part of a device that reads the final destination of a piece of information and sends it across the correct path to reach it.
In a client-server network, what is the role of the server?
The role of the server is the same as the role of the client because all of the computers on this type of network are equal. The role of the server is to maintain connections to remote servers. The role of the server is to send out requests for information. The role of the server is to take requests from the client and send back the requested information. Correct answer is D. This is the role of the server in a client-server network.
point-to-point network
The simplest topology of a network. it is a dedicated link between two resources but it is limiting.
Ring Topology
Topology where the computers are connected on a loop or ring. Data flows in one direction only. A LAN configuration in which all nodes are connected in a closed loop
What is the likely reason that the transmission from the firewall to the credit card processing cloud is sent through radio waves instead of coaxial or fiber optic cables?
Transmission through radio waves is more secure. The transmissions go through a firewall. The transmission is carrying a lot of information. The transmission is long distance. Correct answer is D. Radio towers are used to send radio waves over a long distance.
Indicate whether the following statements are true of a wireless access point, a radio tower, or both. Is commonly connected to a router
Wireless access point Radio tower Both Correct answer is A. Wireless access points are often connected to a router.
Indicate whether the following statements are true of a wireless access point, a radio tower, or both. Is best used for long distances
Wireless access point Radio tower Both Correct answer is Radio Tower. Radio towers use radio signals that are bounced off of satellites and therefore can be used over very long distances.
Indicate whether the following statements are true of a wireless access point, a radio tower, or both. Allows devices to connect without a cable
Wireless access point Radio tower Both Correct answer is both. A device can connect wirelessly using either a Wireless access point and/or a Radio tower.
Indicate whether each of the following is (yes) or is not (no) a benefit of using virtual machines. Permits multiple platforms and multiple users
Yes No Correct answer is Yes. A virtual machine (VM) is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers.
Indicate whether each of the following is (yes) or is not (no) a benefit of using virtual machines. Provide a secure remote environment.
Yes No Correct answer is yes. A VM can provide a secure remote environment.
Indicate whether each of the following is (yes) or is not (no) a benefit of using virtual machines. Lower costs and improved collaboration.
Yes No Correct answer is yes. A virtual machine (VM) is a software emulator program that permits a computer user to use multiple computers and multiple platforms without the expense of purchasing multiple computers. This also provides for improved collaboration because platforms and software are not a limitation.
Indicate whether each of the following explains the role of a DNS server. It is a server with a table that contains IP addresses and aliases.
Yes No Correct answer is yes. Every network either has a DNS or knows where to find a DNS.
Indicate whether each of the following is (yes) or is not (no) a benefit of using virtual machines. Ability to communicate with different OSs.
Yes No Correct answer is yes. VMs can communicate with different OSs without needing multiple computers and multiple platforms.
Indicate whether each of the following is (yes) or is not (no) part of the definition of Network. Only uses the Internet to connect to other computers
Yes No Correct answer is no. A network may use the cloud to store information, but this is not the only way in which information can be stored within the network.
Indicate whether each of the following is (yes) or is not (no) part of the definition of Network. Provides individuals with the ability to share data, documents, and hardware (e.g., printers, file servers)
Yes No Correct answer is yes. Because a network is composed of connected devices, this allows data, documents and hardware to be shared.
Indicate whether each of the following is (yes) or is not (no) part of the definition of Network. A collection of computers connected in such a way that they can communicate with each other
Yes No Correct answer is yes. In a network, computers and other devices are connected and can communicate.
computer network
a collection of computers and computer resources (e.g., printers, file servers) connected in such a way that the computers can communicate with each other and their resources.
router
a device that connects networks to each other
The role of the server in a business computing ecosystem is to
determine the best path for messages. connect multiple networks within a wide area network. take requests from computers and respond with the requested information. running software for multiple OSs. Correct answer is C. Servers are computers that typically have greater hard disk storage and faster response time and are used to respond to requests from other computers in a network.
coaxial and twisted pair
electric
Common characteristics of servers are
greater hard disk storage, slower response time, single hard drives. larger hard disk drives for more storage, faster response time, more expensive. multiple hard disk drives, networked with other servers, lower cost. run VM software, allow for remote access, request information from other computers. Correct answer is B. The servers larger hard disk drives and faster response time allow the server to respond efficiently to requests from other computers in a network.
Most computer networks, including the Internet, are
packet switched. The packet-switched network is more practical for today's modern networks such as the internet because messages can be routed based on availability and network traffic.
radio and cell towers
radio waves