Chapter#12

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Multi-factor authentication requires three of four possible factors be demonstrated before authorizationis granted.

False

UTP cable has foil shielding.

False

Which of the following is the most commonly used client/server network topology?

Star

Bus networks use a passive topology.

True

The Institute of Electrical and Electronics Engineers (IEEE) has established worldwide networking protocols, including the Open Systems Interconnection (OSI) reference model.

True

The foil sheath on a STP cable is there to help cut down on interference.

True

When several people need access to a database, a dedicated database server can be the solution.

True

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

bastion host

Which of the following is not a major factor to consider when selecting network cabling?

Cable diameter

Which of the following is not a common network topology?

Cluster

Data flows in both directions around the ring in a ring network.

False

In a client/server network, each network node communicates directly with every other node on the network.

False

In a star topology, the nodes connect to a central communications device called a router.

False

MAC addresses and IP addresses are the same thing.

False

MAC addresses are restricted to Macintosh computers.

False

Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.

False

A(n) ________ address is the address that external entities use when communicating with your network.

IP

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

Jam

Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.

True

In an active topology, each node helps to move data through a network.

True

P2P networks become difficult to administer when they have large numbers of users.

True

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

authentication

In which topology are all computers connected in sequence on a single cable?

bus

A ________ network can contain servers as well as individual computers.

client/server

Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.

information assurance

The physical address assigned to each network adapter is called its ________ address.

media access control (MAC)

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

screening

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

spooler

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

terminator

Cars often have ________ connectivity.

Wi-Fi and Bluetooth

________ is the standard communications protocol used on most client/server networks.

Ethernet

An international company like Microsoft would use a MAN to connect all of its computers.

False

Which of the following would not be considered a possessed object?

password

A network ________ is a set of rules for how information and communications are exchanged.

protocol

A ________ sends information between two networks.

router

Most wired home networks use ________ cable, which is most susceptible to interference.

unshielded twisted-pair

Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?

virtualization


Kaugnay na mga set ng pag-aaral

Structures, Locations, and Functions of the Three Types of Muscular Tissue

View Set

Nutrition chapter 6, 7, 14, 15, 8, 9

View Set

Pennys Book Chapter 2 Review Questions- The Liver

View Set

Ionic Bonds, Polar Covalent Bonds, Non-polar Covalent Bonds

View Set

Chapter 2 - Database Requirements and ER Modeling

View Set