Chapter 12
Network adapters send data packets based on a(n) a. frame address. b. router address. c. IP address. d. MAC address.
d. MAC address.
Which network cable type is virtually immune to signal interference? a. STP b. UTP c. coaxial d. fiber-optic
d. fiber-optic
Switches are used to send data on a specific route through an internal network. a. True b. False
a. True
Which of the following is an advantage of installing a client/server network in a business? a. sharing of peripherals b. centralization of network adapters c. decentralization of peripherals d. decentralization of files and data
a.sharing of peripherals
A proxy server is used to host websites on a client/server network. a. True b. False
b. False
MAC adapters perform specific tasks to enable nodes to communicate on a network. a. True b. False
b. False
Most modern operating systems do not include some type of NOS functionality. a. True b. False
b. False
Ring topologies are the most widely used topology. a. True b. False
b. False
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? a. WAN b. intranet c. PAN d. VPN
b. intranet
Which is NOT a key component of a typical client/server network? a. NOS b. terminator c. transmission media d. network navigation devices
b. terminator
The process whereby users prove they have authorization to use a computer network is known as a. authentication. b. proxy control. c. repudiation. d. decentralization.
a. authentication.
Which server would a client/server network include to control data exchanges with other networks? a. communications b. database c. application d. authentication
a. communications
Which topology tends to provide the fairest allocation of network resources? a. ring b. bus c. star d. VPN
a. ring
Providing adequate security on a corporate network involves all of the following issues EXCEPT a. proprietary software encryption. b. limiting physical access to networking equipment. c. authentication. d. restricting access to servers.
a.proprietary software encryption.
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network a. decentralization. b. scalability. c. topology. d. flexibility.
b. scalability.