CSC chap 9
A ________ is a network composed of a group of clients and servers under the control of one central security database. client workgroup homegroup domain
Domain
Data travels in both directions in a ring topology. True False
False
Network resources refer only to hardware and files. True False
False
The unauthorized use of your neighbor's wireless network is called trolling. True False
False
Which of the following is NOT a common LAN topology? Hierarchical Star Ring Bus
Hierarchial
When you decide to use your neighbor's open wireless network without permission, you are ________. wardriving piggybacking hacking trolling
Piggybacking
A ________ is a device that connects two or more networks together. modem router hub switch
Router
A ________ is a device that connects multiple devices on a LAN. repeater switch bus router
Switch
Most home routers also include a built-in ________. network interface card hub range extender switch
Switch
Which of the following statements about P2P networks is FALSE? All computers are considered equal. The services and security are centralized. They can only support a small number of devices. They can share a printer.
The services and security are centralized
A firewall can be used to shield your computer from direct access to the Internet. True False
True
A hybrid network in which several LANs are connected together can be called a Campus Area Network. True False
True
A star topology allows nodes to be easily added, removed, or moved, without disrupting the network. True False
True
In a network, a file can be an example of a resource. True False
True
One advantage of using a domain is that you only have to log in one time to obtain access to all of the servers within that domain. True False
True
The HTTP protocol requests and delivers webpages. True False
True
The IEEE 802.11 standards are used in Wi-Fi networks found in homes and public hotspots. True False
True
Windows Defender is antimalware software built-in to Microsoft operating systems. True False
True
In a WLAN, devices are connected by ________. Bluetooth ultraviolet Wi-Fi RFID
WiFi
One of the most important reasons for Ethernet standards is it ________. can prevent unauthorized users from accessing the Internet prevents overburdening your computer assures equipment from different manufacturers is compatible allows the government to keep tabs on what you are doing
assures equipment from different manufacturers is compatible