IS 101 - TMCC - TECHNOLOGY IN ACTION - CHAPTER 12 QUIZ
A ________ topology uses more than one type of topology when building a network.
hybrid
A MAC address
is used for internal identification purposes on a network.
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
jam
The physical address assigned to each network adapter is called its ________ address.
media access control (MAC)
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
network
Which device is primarily responsible for network nodes being able to communicate with each other?
network adapter
NOS software is needed
on all computers in a client/server network.
The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network
topology.
Which type of server is used to host websites on a client/server network?
web
Scalability:
A characteristic of client/server networks where more users can be easily added without affecting the performance of other network nodes.
Centralized:
A characteristic of client/server networks where the server, not the individual nodes, provide services such as data security.
Decentralized:
A characteristic of peer-to-peer networks where the individual nodes provide services such as data security.
Open Systems Interconnection (OSI):
A networking protocol established by the Institute of Electrical and Electronics Engineers (IEEE) that provides guidelines for modern networks.
Client/server network:
A type of network that uses servers to deliver services to computers that are requesting them (clients).
________ is the standard communications protocol used on most client/server networks.
Ethernet
A bridge sends information between two networks.
False
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
False
An international company like Microsoft would use a MAN to connect all of its computers.
False
Data flows in both directions around the ring in a ring network.
False
MAC addresses and IP addresses are the same thing.
False
MAC addresses are restricted to Macintosh computers.
False
Worms often try to disguise their origins by using a bogus IP address instead of using an authorized IP address belonging to the network.
False
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
Fiber-optic
A(n) ________ address is the address that external entities use when communicating with your network.
IP
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers?
Intranet
The computers in a lab on a floor of a building would be connected using a ________.
LAN
Network adapters send data packets based on a(n)
MAC address.
Special software that needs to be installed on each computer connected to a network is known as ________ software.
NOS
A network consisting of devices used by a single person connected via wireless media is a
PAN.
Network administrator:
Person who maintains networks for a business or organization.
Why are client/server networks usually installed in businesses?
They are more scalable than P2P networks.
The process whereby users prove they have authorization to use a computer network is known as
authentication.
Which of the following is used to increase security on a client/server network?
bastion host
A ________ sends data from one collision domain to another.
bridge
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
bus
A ________ network can contain servers as well as individual computers.
client/server
Which server would a client/server network include to control data exchanges with other networks?
communications
Which of the following is NOT an advantage of installing a network in a business?
decentralization of files and data
Fiber-optic cable most likely would be used in a business network when
electrical or magnetic interference is present.
Which network cable type is virtually immune to signal interference?
fiber-optic
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
True
Transmission media comprise the system that data takes to flow between devices on the network.
True
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
True
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
authentication
To manage authorized connections to internal networks, which server would a client/server network include?
authentication
Providing adequate security on a corporate network involves all of the following issues EXCEPT
proprietary software encryption.
Which topology tends to provide the fairest allocation of network resources?
ring
On client/server networks, bridges
route data between two collision domains on a single network.
A ________ sends information between two networks.
router
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
scalability.
Which of the following is an advantage of installing a client/server network in a business?
sharing of peripherals
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
spooler
Which of the following is the most widely used network topology today?
star
Which device is used to send data on a specific route through an internal network?
switch
Which is NOT a key component of a typical client/server network?
terminator
Ring networks use the ________ method to avoid data collisions.
token