Chapter 12
The computers in a lab on a floor of a building would be connected using a ________
LAN
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
A ________ sends data from one collision domain to another.
bridge
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________
brute force attack
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
jam
The physical address assigned to each network adapter is called its ________ address
media access control (MAC)
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
network
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
Which of the following is NOT a factor to consider when selecting network cabling?
cable diameter
A bridge sends information between two networks.
false
A phishing attack is an attempt to access an account by repeatedly trying different passwords
false
In a client/server network, each network node communicates directly with every other node on the network.
false
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network
false
A ________ keeps your computer safe by determining who is trying to access it.
firewall
A ________ topology uses more than one topology when building a network.
hybrid
For business networks, which of the following is NOT one of the main cable types?
polyvinyl
A network ________ is a set of rules for how information and communications are exchanged
protocol
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it
true
In an active topology, each node helps to move data through a network.
true
P2P networks are very difficult to administer when they have large numbers of users.
true