Chapter 12
biometric
Facial recognition is an example of _________ authentication
peer-to-peer
In a __________ network, each node connected to the network communicates directly with every other node
screening
Packet ______ is a form of protection for your computer that looks at each packet that comes into your computer network
a method used to avoid data collisions
What is CSMA/CD?
Media access control (MAC)
What is another name for the physical address assigned to each network adapter?
hyperText Transfer protocol (HTTP)
Which is not a networking protocol---- Apple file protocol (AFP), NetBIOS Extended User Interface (NetBEUI), Internet Packet Exchange (IPX), HyperText Transfer Protocol (HTTP)
EMI
Which of the following causes interferences when a cable is exposed to strong electromagnetic fields
bridge
Which of the following devices sends data from one collision domain to another
cluster
Which of the following is NOT a common network topology--- star, cluste, bus, ring
cable diameter
Which of the following is NOT a factor to consider when selecting network cabling--- cable diameter, interference, maximum run length , bandwidth
Bus
Which of the following networks is most known for data collisions
client/server
________ networks contain servers as well as computer that individual users access and use
routers
__________ are often equipped to act as hardware firewalls
fiber-optic
___________ cable is NOT subject to electromagnetic interference or radio frequency interference
token
A ____ is passed from computer to computer around the ring of a ring topology network
PAN
A _______ is a network used by one person connection via wireless media
network
A ________ is a group of two more computers, or nodes, configured to share information
protocol
A ________ is a set of rules for how information and communication are exchanged
network operating system
A _________ needs to be installed on each each client computer and server connected to the network to provide the services necessary for them to communicate
VPN
A _________ uses the public internet communications infrastructure to build a secure, private network
queue
A print server uses a print _______ as a software holding area for printing jobs
terminator
the ends of the cable in a bus network use a ________ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal
switch
the star topology uses a central _________ to connect all network nodes