Chapter 12
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
False
An international company like Microsoft would use a MAN to connect all of its computers.
False
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
False
n an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
Jam
The computers in a lab on a floor of a building would be connected using a _
LAN
A network ________ is a set of rules for how information and communications are exchanged.
Protocol
A ________ sends information between two networks.
Router
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
Screening
Transmission media comprise the system that data takes to flow between devices on the network.
True
ireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms
True
Cars often have ________ networks.
Wi-Fi and Bluetooth
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
bastion host
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________
brute force attack
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
Authentication
The physical address assigned to each network adapter is called its ________ address.
media access control (MAC)
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
network
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
spooler
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
A ________ network can contain servers as well as individual computers.
client/server
Which of the following is NOT a common network topology?
cluster