chapter 12 infotech
A(n) ________ server is a server that stores and manages files for network users. e-mail database print file
file
A ________ keeps your computer safe by determining who is trying to access it. hub firewall gateway switch
firewall
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. stop crash jam hit
jam
The physical address assigned to each network adapter is called its ________ address. physical address control (PAC) network physical address (NPA) media access control (MAC) network access control (NAC)
media access control (MAC)
A ________ is a group of two or more computers, or nodes, configured to share information and resources. router bridge bus network
network
The physical or logical arrangement of computers, transmission media (cables), and other network components is known as network domain. blueprint. protocol. topology.
topology.
Network adapters send data packets based on a(n) MAC address. router address. IP address. frame address.
MAC address.
A network consisting of devices used by a single person connected via wireless media is a LAN. PAN. WAN. MAN.
PAN
Why are client/server networks usually installed in businesses? Security is weaker on client/server networks. They are more scalable than P2P networks. Client/server networks are cheaper to install. They do not require dedicated servers like P2P networks.
They are more scalable than P2P networks.
A ________ uses the Internet communications infrastructure to build a secure and private network. HAN PAN VPN WAN
VPN
Cars often have ________ connectivity. IPv7 and IPv6 Exhaust and fuel injection ROVER-5 and ethernet Wi-Fi and Bluetooth
Wi-Fi and Bluetooth
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? PAN intranet VPN WAN
intranet
A MAC address is the address external entities use to communicate with your network. is used for internal identification purposes on a network. is only used on Apple computers. is the same thing as an IP address.
is used for internal identification purposes on a network.
NOS software is needed only on the servers in a client/server network. only when configuring a network in a star topology. on all computers in a client/server network. only if a communications server is deployed on a client/server network.
on all computers in a client/server network.
Providing adequate security on a corporate network involves all of the following issues EXCEPT limiting physical access to networking equipment. restricting access to servers. authentication. proprietary software encryption.
proprietary software encryption.
A network ________ is a set of rules for how information and communications are exchanged. protocol packet frame token
protocol
Which topology tends to provide the fairest allocation of network resources? star bus VPN ring
ring
On client/server networks, bridges are necessary only in networks using the ring topology. transfer data between two networks. route data between two collision domains on a single network. move data efficiently from node to node on the internal network.
route data between two collision domains on a single network.
A ________ sends information between two networks. router switch bridge repeater
router
On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network scalability. topology. decentralization. flexibility.
scalability.
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. screening scanning viewing examination
screening
Which of the following is an advantage of installing a client/server network in a business? centralization of network adapters decentralization of files and data sharing of peripherals decentralization of peripherals
sharing of peripherals
Which is NOT a key component of a typical client/server network? transmission media terminator network navigation devices NOS
terminator
Switches are used to send data on a specific route through an internal network. True/False
True
A print server uses a print ________ as a software holding area for jobs waiting to be printed. heap stack spooler logger
spooler
________ is the standard communications protocol used on most client/server networks. VPN Ethernet Mac NOS
Ethernet
A proxy server is used to host websites on a client/server network. True/False
False
MAC adapters perform specific tasks to enable nodes to communicate on a network. True/False
False
Most modern operating systems do not include some type of NOS functionality. True/False
False
Ring topologies are the most widely used topology. True/False
False
________ cable is NOT subject to electromagnetic interference or radio frequency interference. Fiber-optic Coaxial Polycarbonate Twisted-pair
Fiber-optic
A(n) ________ address is the address that external entities use when communicating with your network. WAP IP ALU MAC
IP
The computers in a lab on a floor of a building would be connected using a ________. PAN LAN WAN MAN
LAN
To manage authorized connections to internal networks, which server would a client/server network include? communications application database authentication
authentication
The process whereby users prove they have authorization to use a computer network is known as decentralization. repudiation. authentication. proxy control.
authentication.
Which of the following is used to increase security on a client/server network? transmission media bastion host bridge database server
bastion host
A ________ sends data from one collision domain to another. link router bridge switch
bridge
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________. brute force attack worm spammer Trojan horse
brute force attack
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. bus cluster hierarchical star
bus
A ________ network can contain servers as well as individual computers. peer-to-peer bridge client/server switch
client/server
Which of the following is NOT a common network topology? Cluster Linear bus Ring Star
cluster
Which server would a client/server network include to control data exchanges with other networks? database authentication application communications
communications
Which of the following is NOT an advantage of installing a network in a business? decentralization of files and data enables peripheral sharing centralization of files and data enables software sharing
decentralization of files and data
Fiber-optic cable most likely would be used in a business network when electrical or magnetic interference is present. the installation budget is very limited. saving money is more important than speed. very short cable runs are required.
electrical or magnetic interference is present.
Which network cable type is virtually immune to signal interference? fiber-optic STP coaxial UTP
fiber-optic